(978) 993-8038 facebook twitter linkedin google youtube pinterest rss

Patrick Agostino

Resolve I.T. has been serving the Beverly area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Improperly Disposing of a Hard Drive Can Threaten Your Security

Improperly Disposing of a Hard Drive Can Threaten Your Security

No technology lasts forever. Your business will need to replace server hardware or workstations eventually, no matter how well you take care of it. However, what do you do with the hard drive of any device that you have to replace? If you don’t take action to destroy your old hard drive (after moving any data off of it as needed), you could be in violation of various compliance guidelines issued by HIPAA.

Why is HIPAA Important?
The Health Insurance Portability and Accountability Act of 1996 accomplishes two major goals: protect the health insurance coverage of workers as they change their employment, and protect the privacy of health data. One of the best ways to protect data like this is to make sure that only a certain number of copies are available, and that none of them are sitting around and waiting for someone to steal them. Even if it’s just sitting around waiting to be recovered, the data is at risk.

The latter point is particularly important since medical professionals need to store each individual patient’s data on their systems. Doctors aren’t immune to the dangers of hardware failure, and if they carelessly chuck their old hard drives following a catastrophic failure of some sort, there could be serious consequences. HIPAA provides specific requirements that healthcare providers need to adhere to in order to avoid liability for any issues related to data privacy.

How Do You Destroy Your Data?
One oddity with HIPAA compliance is that it doesn’t provide organizations or healthcare providers with any specific way to destroy data. However, it does provide some suggestions. You can magnetize your hard drive to delete data, or you could just smash it into a billion little pieces. One other common way of destroying data on a hard drive is by taking a power drill to it, but any physical destruction of the drive will work sufficiently. In order to completely destroy your data, however, you’ll want to take a few more steps. One of the best ways to make sure that your organization is prepared to face HIPAA compliance is by working with a managed service provider. Instead of destroying the drive yourself, you can leave it up to the professionals to use specialized equipment to destroy the drive, eliminating any risk on your end.

Does your organization need assistance with keeping compliance issues at the top of mind? Resolve I.T. can help your organization ensure data compliance with your specific industry’s standards. To learn more, reach out to us at (978) 993-8038.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, 23 March 2018
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Tag Cloud

Security Tip of the Week Technology Privacy Best Practices Cloud Microsoft Productivity Hackers Internet Google Malware Business Computing Miscellaneous Backup Business Efficiency Hosted Solutions Smartphones IT Support Mobile Devices Software Windows Email Smartphone Upgrade Android Windows 10 Business Management IT Services Communications Save Money Innovation Hardware Microsoft Office Workplace Tips VoIP Alert Holiday Social Media Computer Browser User Tips Office Communication Remote Computing Server Managed Service Provider Business Continuity Network Security Passwords Apple Cybersecurity Quick Tips Marketing Managed IT Services Disaster Recovery Ransomware Employer-Employee Relationship Big Data Network Hacking Virtualization Mobile Device Management Data Outsourced IT Health Automation Small Business Antivirus Mobile Computing Going Green iPhone Remote Monitoring History Chrome IT Solutions WiFi The Internet of Things Application Excel Retail Operating System Productivity App Apps Office Tips Password Facebook Gmail Bandwidth Settings Law Enforcement Analytics Search... VPN Current Events Saving Money Computers Website Spam Physical Security Router Tablet Gadgets Data Management Mouse Recovery Virus Phishing Telephone Systems Government Save Time Cybercrime Memory Mobility Internet of Things VoIP Cloud Computing Office 365 Workers Twitter Artificial Intelligence Social Engineering Politics Wireless Windows 10 Maintenance Lithium-ion battery Wireless Technology Applications Entertainment Battery Data Breach Biometrics BYOD Wi-Fi Google Drive PowerPoint Avoiding Downtime Company Culture Business Intelligence HIPAA Money Safety Tip of the week Budget Cleaning Scam Word Networking DDoS Downtime Tech Support How To Managed IT Services Files Hiring/Firing Windows 8 Robot Printer Best Available IT Support Collaboration End of Support Wearable Technology Internet Exlporer Printer Server Paperless Office Saving Time Data storage Cortana Environment Phone System Programming Customer Relationship Management Fax Server Vulnerability Humor Online Currency People Data Backup Education Two-factor Authentication Access Control Smart Technology Bluetooth Shortcut Information Technology Licensing eWaste Proactive IT Sports Best Practice Hosted Solution Laptop User Error Patch Management Managed IT Websites Cabling Samsung Touchpad Lead Generation Dark Web Managing Stress Running Cable Remote Support Access Vendor Management Relocation Techology Uninterrupted Power Supply Content Filtering Blockchain Windows 8.1 Update Virtual Assistant Data Protection Hacker Printers Net Neutrality HaaS User Tip Social Remote Control Computer Accessories LinkedIn IT budget Crowdfunding WannaCry File Sharing Science Staffing Worker Commute Flexibility Telecommuting Social Networking Spam Blocking Cameras Windows XP IT Management Consultant Black Market Hard Drive Mobile Office Distributed Denial of Service User Security Tablets Debate Tech Terms Legal Shadow IT Millennials IT Consultant Email Management Spotify Automobile Workplace Processors Meetings Business Technology Hard Drives Network Attached Storage Mobile Device Managed IT Service Customer Service Video Surveillance User Spyware Travel Streaming Media Gadget Touchscreen Advertising Server Management Video Games YouTube Telephony Webcam USB Monitor HP Risk Management Live Streaming Encryption Sales Analyitcs Virtual Reality Windows Media Player Private Cloud Machine Learning Alerts NarrowBand Voice over IP Law Firm IT Trending Reputation Document Management WhatsApp Notifications Knowledge Bloatware Piracy PDF Telecommute Work/Life Balance Chromecast eCommerce Multi-Factor Security News Worker Customers Digital SharePoint Comparison Entrepreneur Google Maps Outlook Data loss Bring Your Own Device Online Shopping Data Recovery Telephone System Compliance Edge Display Specifications Copy Botnet Administration Staff Wireless Charging WIndows 7 Human Resources Statistics Conferencing Paste Unified Threat Management Skype

Mobile? Grab this Article!


Recent Comments

Milli Philpson 3 Great Consumer Mobile Apps for Your Business
21 September 2017
According to my view for topic of mobile app is extremely stunning as well as useful for me. Because...