{"id":76603,"date":"2023-10-03T19:19:47","date_gmt":"2023-10-03T18:19:47","guid":{"rendered":"https:\/\/serviceexpress.com\/uk\/?p=76603"},"modified":"2024-05-29T19:43:43","modified_gmt":"2024-05-29T18:43:43","slug":"secure-data-destruction-and-disposal-methods","status":"publish","type":"post","link":"https:\/\/serviceexpress.com\/uk\/resources\/secure-data-destruction-and-disposal-methods\/","title":{"rendered":"Secure data destruction and disposal methods"},"content":{"rendered":"\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\">\n<p>Companies worldwide frequently comb through their IT hardware to dispose of and recycle unused or decommissioned equipment; this process is called <a href=\"https:\/\/serviceexpress.com\/uk\/resources\/what-is-it-asset-disposition-itad\/\">IT Asset Disposition (ITAD)<\/a>. Before equipment is recycled, reused, or safely destroyed, it\u2019s critical to take precautions to protect sensitive information on retired devices.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"#h-what-is-data-destruction\">What is data destruction?<\/a><\/li>\n\n\n\n<li><a href=\"#h-why-is-data-destruction-important\">Why is data destruction important?<\/a><\/li>\n\n\n\n<li><a href=\"#h-common-data-destruction-methods\">Common data destruction methods<\/a><\/li>\n\n\n\n<li><a href=\"#h-data-destruction-standards-and-compliance\">Data destruction standards and compliance<\/a><\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\">\n<h2 class=\"wp-block-heading\" id=\"h-what-is-data-destruction\"><strong>What is data destruction?<\/strong><\/h2>\n\n\n\n<p>Data destruction is the process of disposing of and ensuring vital data is irretrievable.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\">\n<h2 class=\"wp-block-heading\" id=\"h-why-is-data-destruction-important\"><strong>Why is data destruction important?<\/strong><\/h2>\n\n\n\n<p>Just because hardware with sensitive data is recycled doesn\u2019t mean the files are magically unretrievable. Below are several reasons why secure data disposal is essential:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Protects against cyberattacks, data breaches, etc.<\/li>\n\n\n\n<li>Upholds your company\u2019s reputation.<\/li>\n\n\n\n<li>Supports legal and compliance requirements.<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\">\n<h2 class=\"wp-block-heading\" id=\"h-common-data-destruction-methods\"><strong>Common data destruction methods<\/strong><\/h2>\n\n\n\n<p>There are several methods for secure data destruction; however, all techniques aim to destroy data, so it doesn\u2019t end up in the wrong hands.<\/p>\n\n\n\n<div class=\"wp-block-group has-light-blue-background-color has-background is-layout-constrained wp-block-group-is-layout-constrained\">\n<h3 class=\"wp-block-heading\" id=\"h-wiping-overwriting-and-erasing\"><strong>Wiping, overwriting and erasing<\/strong><\/h3>\n\n\n\n<p><strong>Wiping, overwriting and erasing all fall under the same data destruction umbrella. <\/strong>Each method involves overwriting data by writing a sequence of ones and zeros over existing information, rendering it unreadable.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-degaussing\"><strong>Degaussing<\/strong><\/h3>\n\n\n\n<p><strong>Degaussing uses magnetic force to neutralise and permanently destroy data.<\/strong> This method demagnetises the device, erasing the data and making it unrecoverable. Degaussing works for tape storage, flopping disks, VHS, etc. It\u2019s important to note that degaussing permanently damages the device, making it impractical for repurposing devices.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-physical-destruction-and-shredding\"><strong>Physical destruction and shredding<\/strong><\/h3>\n\n\n\n<p><strong>As you can imagine, physical destruction and shredding use excessive force to destroy physical hardware, making it unrecoverable. <\/strong>Like a paper shredder, physical shredding destroys hard drives, circuit boards and storage devices by turning them into small, shredded pieces.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\">\n<h2 class=\"wp-block-heading\" id=\"h-data-destruction-standards-and-compliance\"><strong>Data destruction standards and compliance<\/strong><\/h2>\n\n\n\n<p>ITAD specialists follow regulations and policies for secure data destruction. The standards vary between country and region, but all aim to establish safe and compliant data destruction practices.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-normal-font-size\" id=\"h-the-most-common-data-destruction-standards-in-north-america-and-europe\"><strong>The most common data destruction standards in North America and Europe:<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>United States Department of Defense: <a href=\"https:\/\/www.dami.army.pentagon.mil\/site\/IndustSec\/docs\/DoD%20522022-m.pdf\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">DoD 5220.22-M<\/a>&nbsp;<\/li>\n\n\n\n<li>United States Department of Commerce: <a href=\"https:\/\/nvlpubs.nist.gov\/nistpubs\/SpecialPublications\/NIST.SP.800-88r1.pdf\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">NIST SP 800:88<\/a><\/li>\n<\/ul>\n\n\n\n<p>As you can imagine, it\u2019s critical to have a <a href=\"https:\/\/serviceexpress.com\/uk\/hardware-solutions\/it-asset-disposition\/\">reputable and experienced provider<\/a> assist with your data destruction needs. Make sure to verify their experience, methods, certificate of data destruction, guidelines, security measures and more. Partnering with a reputable vendor for data disposal will protect your organisation from potential threats or vulnerabilities.<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Just because hardware with sensitive data is out of sight doesn\u2019t mean your files aren\u2019t at risk. Keep reading to know why data destruction is important. <\/p>\n","protected":false},"author":32,"featured_media":77049,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ep_exclude_from_search":false,"freeform":false,"hero_image_id":76605,"show_author":false,"table_of_contents":[],"footnotes":""},"categories":[733,738,739,740],"tags":[],"resource":[568],"class_list":["post-76603","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hardware","category-itad","category-security","category-sustainability","resource-articles-insights"],"featured_image_src":"https:\/\/serviceexpress.com\/uk\/wp-content\/uploads\/sites\/5\/2023\/10\/secure-data-destruction-and-disposal-methods-meta.png","yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Secure data destruction and disposal methods | Service Express<\/title>\n<meta name=\"description\" content=\"Just because hardware with sensitive data is out of sight doesn\u2019t mean your files aren\u2019t at risk. Keep reading to know why data destruction is important.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/serviceexpress.com\/uk\/resources\/secure-data-destruction-and-disposal-methods\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Secure data destruction and disposal methods | Service Express\" \/>\n<meta property=\"og:description\" content=\"Just because hardware with sensitive data is out of sight doesn\u2019t mean your files aren\u2019t at risk. Keep reading to know why data destruction is important.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/serviceexpress.com\/uk\/resources\/secure-data-destruction-and-disposal-methods\/\" \/>\n<meta property=\"og:site_name\" content=\"Service Express UK\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/weareserviceexpress\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-03T18:19:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-29T18:43:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/serviceexpress.com\/uk\/wp-content\/uploads\/sites\/5\/2023\/10\/secure-data-destruction-and-disposal-methods-meta.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jackie Kirkwood\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ServiceExpress\" \/>\n<meta name=\"twitter:site\" content=\"@ServiceExpress\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jackie Kirkwood\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/serviceexpress.com\\\/uk\\\/resources\\\/secure-data-destruction-and-disposal-methods\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/serviceexpress.com\\\/uk\\\/resources\\\/secure-data-destruction-and-disposal-methods\\\/\"},\"author\":{\"name\":\"Jackie Kirkwood\",\"@id\":\"https:\\\/\\\/serviceexpress.com\\\/uk\\\/#\\\/schema\\\/person\\\/c3c8f554ab1d5e7713b62782cfce8f1d\"},\"headline\":\"Secure data destruction and disposal methods\",\"datePublished\":\"2023-10-03T18:19:47+00:00\",\"dateModified\":\"2024-05-29T18:43:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/serviceexpress.com\\\/uk\\\/resources\\\/secure-data-destruction-and-disposal-methods\\\/\"},\"wordCount\":406,\"publisher\":{\"@id\":\"https:\\\/\\\/serviceexpress.com\\\/uk\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/serviceexpress.com\\\/uk\\\/resources\\\/secure-data-destruction-and-disposal-methods\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/serviceexpress.com\\\/uk\\\/wp-content\\\/uploads\\\/sites\\\/5\\\/2023\\\/10\\\/secure-data-destruction-and-disposal-methods-meta.png\",\"articleSection\":[\"Hardware\",\"ITAD\",\"Security\",\"Sustainability\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/serviceexpress.com\\\/uk\\\/resources\\\/secure-data-destruction-and-disposal-methods\\\/\",\"url\":\"https:\\\/\\\/serviceexpress.com\\\/uk\\\/resources\\\/secure-data-destruction-and-disposal-methods\\\/\",\"name\":\"Secure data destruction and disposal methods | Service Express\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/serviceexpress.com\\\/uk\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/serviceexpress.com\\\/uk\\\/resources\\\/secure-data-destruction-and-disposal-methods\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/serviceexpress.com\\\/uk\\\/resources\\\/secure-data-destruction-and-disposal-methods\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/serviceexpress.com\\\/uk\\\/wp-content\\\/uploads\\\/sites\\\/5\\\/2023\\\/10\\\/secure-data-destruction-and-disposal-methods-meta.png\",\"datePublished\":\"2023-10-03T18:19:47+00:00\",\"dateModified\":\"2024-05-29T18:43:43+00:00\",\"description\":\"Just because hardware with sensitive data is out of sight doesn\u2019t mean your files aren\u2019t at risk. Keep reading to know why data destruction is important.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/serviceexpress.com\\\/uk\\\/resources\\\/secure-data-destruction-and-disposal-methods\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/serviceexpress.com\\\/uk\\\/resources\\\/secure-data-destruction-and-disposal-methods\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/serviceexpress.com\\\/uk\\\/resources\\\/secure-data-destruction-and-disposal-methods\\\/#primaryimage\",\"url\":\"https:\\\/\\\/serviceexpress.com\\\/uk\\\/wp-content\\\/uploads\\\/sites\\\/5\\\/2023\\\/10\\\/secure-data-destruction-and-disposal-methods-meta.png\",\"contentUrl\":\"https:\\\/\\\/serviceexpress.com\\\/uk\\\/wp-content\\\/uploads\\\/sites\\\/5\\\/2023\\\/10\\\/secure-data-destruction-and-disposal-methods-meta.png\",\"width\":1200,\"height\":628,\"caption\":\"An image of a male engineer wearing headphones at a workbench testing parts\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/serviceexpress.com\\\/uk\\\/resources\\\/secure-data-destruction-and-disposal-methods\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/serviceexpress.com\\\/uk\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Resources\",\"item\":\"https:\\\/\\\/serviceexpress.com\\\/uk\\\/resources\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Secure data destruction and disposal methods\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/serviceexpress.com\\\/uk\\\/#website\",\"url\":\"https:\\\/\\\/serviceexpress.com\\\/uk\\\/\",\"name\":\"Service Express UK\",\"description\":\"Global Data Center Solutions &amp; Support\",\"publisher\":{\"@id\":\"https:\\\/\\\/serviceexpress.com\\\/uk\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/serviceexpress.com\\\/uk\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/serviceexpress.com\\\/uk\\\/#organization\",\"name\":\"Service Express UK\",\"url\":\"https:\\\/\\\/serviceexpress.com\\\/uk\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/serviceexpress.com\\\/uk\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/serviceexpress.com\\\/uk\\\/wp-content\\\/uploads\\\/sites\\\/5\\\/2022\\\/01\\\/service-express-meta.jpg\",\"contentUrl\":\"https:\\\/\\\/serviceexpress.com\\\/uk\\\/wp-content\\\/uploads\\\/sites\\\/5\\\/2022\\\/01\\\/service-express-meta.jpg\",\"width\":1200,\"height\":628,\"caption\":\"Service Express UK\"},\"image\":{\"@id\":\"https:\\\/\\\/serviceexpress.com\\\/uk\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/weareserviceexpress\\\/\",\"https:\\\/\\\/x.com\\\/ServiceExpress\",\"https:\\\/\\\/www.instagram.com\\\/serviceexpress\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/service-express-inc\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCa1MO2iHOytlWx_xCX9uoug\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/serviceexpress.com\\\/uk\\\/#\\\/schema\\\/person\\\/c3c8f554ab1d5e7713b62782cfce8f1d\",\"name\":\"Jackie Kirkwood\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3ec414fe340887ec3bd598cb173da2e304f308f682481ea454838e0f1148410b?s=96&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3ec414fe340887ec3bd598cb173da2e304f308f682481ea454838e0f1148410b?s=96&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3ec414fe340887ec3bd598cb173da2e304f308f682481ea454838e0f1148410b?s=96&r=g\",\"caption\":\"Jackie Kirkwood\"},\"url\":\"https:\\\/\\\/serviceexpress.com\\\/uk\\\/author\\\/jkirkwood\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Secure data destruction and disposal methods | Service Express","description":"Just because hardware with sensitive data is out of sight doesn\u2019t mean your files aren\u2019t at risk. Keep reading to know why data destruction is important.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/serviceexpress.com\/uk\/resources\/secure-data-destruction-and-disposal-methods\/","og_locale":"en_GB","og_type":"article","og_title":"Secure data destruction and disposal methods | Service Express","og_description":"Just because hardware with sensitive data is out of sight doesn\u2019t mean your files aren\u2019t at risk. Keep reading to know why data destruction is important.","og_url":"https:\/\/serviceexpress.com\/uk\/resources\/secure-data-destruction-and-disposal-methods\/","og_site_name":"Service Express UK","article_publisher":"https:\/\/www.facebook.com\/weareserviceexpress\/","article_published_time":"2023-10-03T18:19:47+00:00","article_modified_time":"2024-05-29T18:43:43+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/serviceexpress.com\/uk\/wp-content\/uploads\/sites\/5\/2023\/10\/secure-data-destruction-and-disposal-methods-meta.png","type":"image\/png"}],"author":"Jackie Kirkwood","twitter_card":"summary_large_image","twitter_creator":"@ServiceExpress","twitter_site":"@ServiceExpress","twitter_misc":{"Written by":"Jackie Kirkwood","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/serviceexpress.com\/uk\/resources\/secure-data-destruction-and-disposal-methods\/#article","isPartOf":{"@id":"https:\/\/serviceexpress.com\/uk\/resources\/secure-data-destruction-and-disposal-methods\/"},"author":{"name":"Jackie Kirkwood","@id":"https:\/\/serviceexpress.com\/uk\/#\/schema\/person\/c3c8f554ab1d5e7713b62782cfce8f1d"},"headline":"Secure data destruction and disposal methods","datePublished":"2023-10-03T18:19:47+00:00","dateModified":"2024-05-29T18:43:43+00:00","mainEntityOfPage":{"@id":"https:\/\/serviceexpress.com\/uk\/resources\/secure-data-destruction-and-disposal-methods\/"},"wordCount":406,"publisher":{"@id":"https:\/\/serviceexpress.com\/uk\/#organization"},"image":{"@id":"https:\/\/serviceexpress.com\/uk\/resources\/secure-data-destruction-and-disposal-methods\/#primaryimage"},"thumbnailUrl":"https:\/\/serviceexpress.com\/uk\/wp-content\/uploads\/sites\/5\/2023\/10\/secure-data-destruction-and-disposal-methods-meta.png","articleSection":["Hardware","ITAD","Security","Sustainability"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/serviceexpress.com\/uk\/resources\/secure-data-destruction-and-disposal-methods\/","url":"https:\/\/serviceexpress.com\/uk\/resources\/secure-data-destruction-and-disposal-methods\/","name":"Secure data destruction and disposal methods | Service Express","isPartOf":{"@id":"https:\/\/serviceexpress.com\/uk\/#website"},"primaryImageOfPage":{"@id":"https:\/\/serviceexpress.com\/uk\/resources\/secure-data-destruction-and-disposal-methods\/#primaryimage"},"image":{"@id":"https:\/\/serviceexpress.com\/uk\/resources\/secure-data-destruction-and-disposal-methods\/#primaryimage"},"thumbnailUrl":"https:\/\/serviceexpress.com\/uk\/wp-content\/uploads\/sites\/5\/2023\/10\/secure-data-destruction-and-disposal-methods-meta.png","datePublished":"2023-10-03T18:19:47+00:00","dateModified":"2024-05-29T18:43:43+00:00","description":"Just because hardware with sensitive data is out of sight doesn\u2019t mean your files aren\u2019t at risk. Keep reading to know why data destruction is important.","breadcrumb":{"@id":"https:\/\/serviceexpress.com\/uk\/resources\/secure-data-destruction-and-disposal-methods\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/serviceexpress.com\/uk\/resources\/secure-data-destruction-and-disposal-methods\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/serviceexpress.com\/uk\/resources\/secure-data-destruction-and-disposal-methods\/#primaryimage","url":"https:\/\/serviceexpress.com\/uk\/wp-content\/uploads\/sites\/5\/2023\/10\/secure-data-destruction-and-disposal-methods-meta.png","contentUrl":"https:\/\/serviceexpress.com\/uk\/wp-content\/uploads\/sites\/5\/2023\/10\/secure-data-destruction-and-disposal-methods-meta.png","width":1200,"height":628,"caption":"An image of a male engineer wearing headphones at a workbench testing parts"},{"@type":"BreadcrumbList","@id":"https:\/\/serviceexpress.com\/uk\/resources\/secure-data-destruction-and-disposal-methods\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/serviceexpress.com\/uk\/"},{"@type":"ListItem","position":2,"name":"Resources","item":"https:\/\/serviceexpress.com\/uk\/resources\/"},{"@type":"ListItem","position":3,"name":"Secure data destruction and disposal methods"}]},{"@type":"WebSite","@id":"https:\/\/serviceexpress.com\/uk\/#website","url":"https:\/\/serviceexpress.com\/uk\/","name":"Service Express UK","description":"Global Data Center Solutions &amp; Support","publisher":{"@id":"https:\/\/serviceexpress.com\/uk\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/serviceexpress.com\/uk\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/serviceexpress.com\/uk\/#organization","name":"Service Express UK","url":"https:\/\/serviceexpress.com\/uk\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/serviceexpress.com\/uk\/#\/schema\/logo\/image\/","url":"https:\/\/serviceexpress.com\/uk\/wp-content\/uploads\/sites\/5\/2022\/01\/service-express-meta.jpg","contentUrl":"https:\/\/serviceexpress.com\/uk\/wp-content\/uploads\/sites\/5\/2022\/01\/service-express-meta.jpg","width":1200,"height":628,"caption":"Service Express UK"},"image":{"@id":"https:\/\/serviceexpress.com\/uk\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/weareserviceexpress\/","https:\/\/x.com\/ServiceExpress","https:\/\/www.instagram.com\/serviceexpress\/","https:\/\/www.linkedin.com\/company\/service-express-inc\/","https:\/\/www.youtube.com\/channel\/UCa1MO2iHOytlWx_xCX9uoug"]},{"@type":"Person","@id":"https:\/\/serviceexpress.com\/uk\/#\/schema\/person\/c3c8f554ab1d5e7713b62782cfce8f1d","name":"Jackie Kirkwood","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/3ec414fe340887ec3bd598cb173da2e304f308f682481ea454838e0f1148410b?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/3ec414fe340887ec3bd598cb173da2e304f308f682481ea454838e0f1148410b?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3ec414fe340887ec3bd598cb173da2e304f308f682481ea454838e0f1148410b?s=96&r=g","caption":"Jackie Kirkwood"},"url":"https:\/\/serviceexpress.com\/uk\/author\/jkirkwood\/"}]}},"_links":{"self":[{"href":"https:\/\/serviceexpress.com\/uk\/wp-json\/wp\/v2\/posts\/76603","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/serviceexpress.com\/uk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/serviceexpress.com\/uk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/serviceexpress.com\/uk\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/serviceexpress.com\/uk\/wp-json\/wp\/v2\/comments?post=76603"}],"version-history":[{"count":0,"href":"https:\/\/serviceexpress.com\/uk\/wp-json\/wp\/v2\/posts\/76603\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/serviceexpress.com\/uk\/wp-json\/wp\/v2\/media\/77049"}],"wp:attachment":[{"href":"https:\/\/serviceexpress.com\/uk\/wp-json\/wp\/v2\/media?parent=76603"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/serviceexpress.com\/uk\/wp-json\/wp\/v2\/categories?post=76603"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/serviceexpress.com\/uk\/wp-json\/wp\/v2\/tags?post=76603"},{"taxonomy":"resource","embeddable":true,"href":"https:\/\/serviceexpress.com\/uk\/wp-json\/wp\/v2\/resource?post=76603"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}