(978) 993-8038 facebook twitter linkedin google youtube pinterest rss

Patrick Agostino

Resolve I.T.™ has been serving the Beverly area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Improperly Disposing of a Hard Drive Can Threaten Your Security

Improperly Disposing of a Hard Drive Can Threaten Your Security

No technology lasts forever. Your business will need to replace server hardware or workstations eventually, no matter how well you take care of it. However, what do you do with the hard drive of any device that you have to replace? If you don’t take action to destroy your old hard drive (after moving any data off of it as needed), you could be in violation of various compliance guidelines issued by HIPAA.

Why is HIPAA Important?
The Health Insurance Portability and Accountability Act of 1996 accomplishes two major goals: protect the health insurance coverage of workers as they change their employment, and protect the privacy of health data. One of the best ways to protect data like this is to make sure that only a certain number of copies are available, and that none of them are sitting around and waiting for someone to steal them. Even if it’s just sitting around waiting to be recovered, the data is at risk.

The latter point is particularly important since medical professionals need to store each individual patient’s data on their systems. Doctors aren’t immune to the dangers of hardware failure, and if they carelessly chuck their old hard drives following a catastrophic failure of some sort, there could be serious consequences. HIPAA provides specific requirements that healthcare providers need to adhere to in order to avoid liability for any issues related to data privacy.

How Do You Destroy Your Data?
One oddity with HIPAA compliance is that it doesn’t provide organizations or healthcare providers with any specific way to destroy data. However, it does provide some suggestions. You can magnetize your hard drive to delete data, or you could just smash it into a billion little pieces. One other common way of destroying data on a hard drive is by taking a power drill to it, but any physical destruction of the drive will work sufficiently. In order to completely destroy your data, however, you’ll want to take a few more steps. One of the best ways to make sure that your organization is prepared to face HIPAA compliance is by working with a managed service provider. Instead of destroying the drive yourself, you can leave it up to the professionals to use specialized equipment to destroy the drive, eliminating any risk on your end.

Does your organization need assistance with keeping compliance issues at the top of mind? Resolve I.T.™ can help your organization ensure data compliance with your specific industry’s standards. To learn more, reach out to us at (978) 993-8038.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, 18 September 2018
If you'd like to register, please fill in the username, password and name fields.

Tag Cloud

Security Tip of the Week Technology Privacy Best Practices Cloud Microsoft Business Computing Productivity Hackers Internet Google Malware Miscellaneous Efficiency Backup Smartphones Hosted Solutions Business Mobile Devices Software IT Support Business Management Windows Hardware Communications Android Email Smartphone Innovation Microsoft Office Workplace Tips IT Services Social Media Upgrade Save Money User Tips Windows 10 Network Security Communication VoIP Browser Cybersecurity Holiday Passwords Alert Computer Office Ransomware Network Data Managed IT Services Apple Marketing Tech Term Remote Computing Server Managed Service Provider Employer-Employee Relationship Business Continuity Automation Quick Tips Virtualization Disaster Recovery Productivity Big Data Outsourced IT Small Business Hacking Mobile Device Management Health Apps IT Solutions The Internet of Things Bandwidth Antivirus Mobile Computing Going Green iPhone Operating System Remote Monitoring Chrome History WiFi Application Excel Router Office Tips Retail Gadgets Password Facebook Gmail Wi-Fi App Analytics Internet of Things Collaboration Computers Saving Money PowerPoint Maintenance Cloud Computing Physical Security Tablet Networking Data Backup Data Management Applications Government Search... Settings Cybercrime Law Enforcement Twitter Business Intelligence Website Spam Current Events VPN Artificial Intelligence Wireless IT Support Wireless Technology VoIP Mouse Virus Battery Proactive IT Sports Biometrics Save Time Workers Google Drive Access Control Politics Windows 10 Company Culture Memory Recovery Safety Telephone Systems Mobility Blockchain Data Recovery Data Breach Phishing Patch Management Social Engineering Mobile Device Office 365 Lithium-ion battery Environment Entertainment Compliance BYOD Smart Technology Shortcut Managing Stress Avoiding Downtime Information Technology Managed IT Service Bring Your Own Device eWaste Cortana Money Vulnerability Best Practice Budget Hosted Solution Laptop User Error Downtime Information Printer Hiring/Firing HIPAA Cost Management Cleaning Hard Drives Printer Server DDoS Wireless Charging Programming Tech Support Phone System Humor Customer Relationship Management BDR Files People Education Dark Web Best Available Scam Windows 8 Robot End of Support Wearable Technology Virtual Assistant Tech Terms Tip of the week Internet Exlporer Saving Time Data Protection Data storage Touchscreen Paperless Office Streaming Media Licensing Word Fax Server Online Currency How To Two-factor Authentication Bluetooth Managed IT Services Statistics Email Management PDF Notifications Human Resources Bloatware Paper Millennials Unified Threat Management Hybrid Cloud Processors Machine Learning Work/Life Balance Chromecast SharePoint GDPR Mobile Security Business Technology Samsung Customers Entrepreneur Vendor Management Ink Cables Spyware Telecommute Travel SaaS Storage e-waste Gadget Document Management Google Maps Hacker Display Connectivity Telephony Computer Accessories Voice over Internet Protocol HP Data loss Live Streaming Error disposal Sales Crowdfunding Voice over IP Digital Skype Botnet Science Worker Commute Downloads Cameras Staff WhatsApp Cabling Touchpad Relocation Running Cable Consultant Microsoft Office 365 Value Knowledge Trends eCommerce Debate Edge Multi-Factor Security Techology Managed IT Uninterrupted Power Supply Tablets Amazon Websites News Worker Windows 8.1 Update Net Neutrality Authentication Workplace Comparison A.I. Online Shopping HaaS LinkedIn Social Plug-In Dongle Telephone System Copy User Authorization Database Specifications Movies IT budget Flexibility Social Networking Mobile Office Remote Monitoring and Management Black Market Paste Windows XP Distributed Denial of Service USB Tactics Conferencing Unified Communications Lead Generation IT Management Legal Shadow IT Analyitcs Windows Media Player IT Consultant Meetings Analysis Technology Tips Remote Support Access Spotify Internet Explorer Content Filtering Trending RAM Piracy Video Surveillance Users Customer Service Managed Service Backup and Disaster Recovery Printers Remote Control Advertising Threat User Tip Microsoft Teams WannaCry Network Attached Storage Video Games YouTube Risk Management Reporting Outlook SSD File Sharing Staffing Monitor Spam Blocking Private Cloud Webcam Encryption Virtual Reality Printing Telecommuting Law Firm IT G Suite Hard Drive Server Management Alerts Automobile NarrowBand WIndows 7 Medical IT Administration Inventory User Security Reputation

Mobile? Grab this Article!


Recent Comments

Milli Philpson 3 Great Consumer Mobile Apps for Your Business
21 September 2017
According to my view for topic of mobile app is extremely stunning as well as useful for me. Because...