(978) 993-8038 facebook twitter linkedin google youtube pinterest rss

Patrick Agostino

Resolve I.T. has been serving the Beverly area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Improperly Disposing of a Hard Drive Can Threaten Your Security

Improperly Disposing of a Hard Drive Can Threaten Your Security

No technology lasts forever. Your business will need to replace server hardware or workstations eventually, no matter how well you take care of it. However, what do you do with the hard drive of any device that you have to replace? If you don’t take action to destroy your old hard drive (after moving any data off of it as needed), you could be in violation of various compliance guidelines issued by HIPAA.

Why is HIPAA Important?
The Health Insurance Portability and Accountability Act of 1996 accomplishes two major goals: protect the health insurance coverage of workers as they change their employment, and protect the privacy of health data. One of the best ways to protect data like this is to make sure that only a certain number of copies are available, and that none of them are sitting around and waiting for someone to steal them. Even if it’s just sitting around waiting to be recovered, the data is at risk.

The latter point is particularly important since medical professionals need to store each individual patient’s data on their systems. Doctors aren’t immune to the dangers of hardware failure, and if they carelessly chuck their old hard drives following a catastrophic failure of some sort, there could be serious consequences. HIPAA provides specific requirements that healthcare providers need to adhere to in order to avoid liability for any issues related to data privacy.

How Do You Destroy Your Data?
One oddity with HIPAA compliance is that it doesn’t provide organizations or healthcare providers with any specific way to destroy data. However, it does provide some suggestions. You can magnetize your hard drive to delete data, or you could just smash it into a billion little pieces. One other common way of destroying data on a hard drive is by taking a power drill to it, but any physical destruction of the drive will work sufficiently. In order to completely destroy your data, however, you’ll want to take a few more steps. One of the best ways to make sure that your organization is prepared to face HIPAA compliance is by working with a managed service provider. Instead of destroying the drive yourself, you can leave it up to the professionals to use specialized equipment to destroy the drive, eliminating any risk on your end.

Does your organization need assistance with keeping compliance issues at the top of mind? Resolve I.T. can help your organization ensure data compliance with your specific industry’s standards. To learn more, reach out to us at (978) 993-8038.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 18 January 2018
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Tag Cloud

Security Tip of the Week Technology Privacy Best Practices Microsoft Cloud Productivity Hackers Google Malware Internet Miscellaneous Business Computing Backup Efficiency Business Hosted Solutions Smartphones IT Support Software Mobile Devices Windows Smartphone Windows 10 Upgrade Communications Android Microsoft Office Business Management IT Services Workplace Tips Email Innovation Hardware Holiday VoIP Alert Save Money User Tips Social Media Office Computer Business Continuity Apple Passwords Browser Server Managed Service Provider Disaster Recovery Quick Tips Communication Remote Computing Network Security Marketing Mobile Device Management Cybersecurity Network Hacking Employer-Employee Relationship Health Virtualization Outsourced IT Ransomware Automation IT Solutions The Internet of Things Managed IT Services Chrome Small Business Mobile Computing Data Going Green WiFi iPhone Remote Monitoring History Big Data Excel Office Tips Retail Apps App Antivirus Productivity Operating System Application Router Current Events Password Saving Money Facebook Gmail Search... Settings Law Enforcement Tablet Gadgets Website Bandwidth Biometrics Save Time Google Drive Memory Recovery Maintenance Phishing Wireless Technology Mobility Telephone Systems Government Cybercrime Twitter Internet of Things Social Engineering VoIP Computers Office 365 Lithium-ion battery Spam Entertainment Workers BYOD Wireless Analytics Politics Windows 10 PowerPoint Mouse Battery Physical Security Data Breach Best Practice Budget VPN Hosted Solution Wi-Fi Networking User Error Patch Management Online Currency Artificial Intelligence Data Management Downtime Bluetooth Hiring/Firing HIPAA Tip of the week Safety Printer Cleaning Word Scam Printer Server Sports DDoS Proactive IT Tech Support Phone System Programming Customer Relationship Management How To Humor People Files Managed IT Services Robot Education IT Support Collaboration Company Culture End of Support Cloud Computing Internet Exlporer Data storage Environment Cortana Vulnerability Fax Server Licensing Data Backup Access Control Smart Technology Two-factor Authentication Best Available Windows 8 Shortcut Avoiding Downtime Information Technology Applications Wearable Technology Virus eWaste Money Saving Time Touchscreen Copy Hacker Specifications Wireless Charging Laptop Botnet Computer Accessories Crowdfunding Paste Science Worker Commute Conferencing Lead Generation Cabling Dark Web Touchpad Managed IT Law Firm IT Cameras Consultant Running Cable Remote Support Relocation Access Techology Business Intelligence Tablets Uninterrupted Power Supply Debate Content Filtering Virtual Assistant Workplace Data Protection Printers HaaS Remote Control Hard Drives Social User Tip WannaCry User File Sharing Staffing Flexibility Spam Blocking Display Windows XP Social Networking Telecommuting Hard Drive Black Market Mobile Office USB Distributed Denial of Service User Security Skype Legal Email Management Analyitcs Shadow IT Spotify Windows Media Player Millennials Processors Automobile Meetings Trending Business Technology Managed IT Service Mobile Device Paperless Office Customer Service Piracy Travel Windows 8.1 Update Advertising Gadget Streaming Media Net Neutrality Telephony LinkedIn Video Games YouTube Webcam Risk Management Outlook Live Streaming Monitor Private Cloud Encryption Compliance Virtual Reality Sales Voice over IP Alerts NarrowBand WIndows 7 Administration WhatsApp Reputation PDF Human Resources Notifications Bloatware Statistics Knowledge eCommerce Work/Life Balance Multi-Factor Security Chromecast IT Consultant Unified Threat Management Managing Stress SharePoint Samsung News Customers Worker Vendor Management Entrepreneur Comparison Online Shopping Video Surveillance Data Recovery Bring Your Own Device Google Maps Telephone System

Mobile? Grab this Article!

QR-Code

Recent Comments

Milli Philpson 3 Great Consumer Mobile Apps for Your Business
21 September 2017
According to my view for topic of mobile app is extremely stunning as well as useful for me. Because...