(978) 993-8038 facebook twitter linkedin google youtube pinterest rss

Patrick Agostino

Resolve I.T. has been serving the Beverly area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Improperly Disposing of a Hard Drive Can Threaten Your Security

Improperly Disposing of a Hard Drive Can Threaten Your Security

No technology lasts forever. Your business will need to replace server hardware or workstations eventually, no matter how well you take care of it. However, what do you do with the hard drive of any device that you have to replace? If you don’t take action to destroy your old hard drive (after moving any data off of it as needed), you could be in violation of various compliance guidelines issued by HIPAA.

Why is HIPAA Important?
The Health Insurance Portability and Accountability Act of 1996 accomplishes two major goals: protect the health insurance coverage of workers as they change their employment, and protect the privacy of health data. One of the best ways to protect data like this is to make sure that only a certain number of copies are available, and that none of them are sitting around and waiting for someone to steal them. Even if it’s just sitting around waiting to be recovered, the data is at risk.

The latter point is particularly important since medical professionals need to store each individual patient’s data on their systems. Doctors aren’t immune to the dangers of hardware failure, and if they carelessly chuck their old hard drives following a catastrophic failure of some sort, there could be serious consequences. HIPAA provides specific requirements that healthcare providers need to adhere to in order to avoid liability for any issues related to data privacy.

How Do You Destroy Your Data?
One oddity with HIPAA compliance is that it doesn’t provide organizations or healthcare providers with any specific way to destroy data. However, it does provide some suggestions. You can magnetize your hard drive to delete data, or you could just smash it into a billion little pieces. One other common way of destroying data on a hard drive is by taking a power drill to it, but any physical destruction of the drive will work sufficiently. In order to completely destroy your data, however, you’ll want to take a few more steps. One of the best ways to make sure that your organization is prepared to face HIPAA compliance is by working with a managed service provider. Instead of destroying the drive yourself, you can leave it up to the professionals to use specialized equipment to destroy the drive, eliminating any risk on your end.

Does your organization need assistance with keeping compliance issues at the top of mind? Resolve I.T. can help your organization ensure data compliance with your specific industry’s standards. To learn more, reach out to us at (978) 993-8038.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 22 June 2018
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Tag Cloud

Security Tip of the Week Technology Privacy Best Practices Microsoft Cloud Productivity Hackers Business Computing Internet Google Malware Miscellaneous Backup Business Efficiency Smartphones Mobile Devices Hosted Solutions Software IT Support Business Management Windows Android Smartphone Hardware Email Save Money Innovation Windows 10 IT Services Upgrade Microsoft Office Workplace Tips Social Media Communications Computer Cybersecurity Holiday VoIP Alert Network Security Browser User Tips Office Communication Ransomware Managed Service Provider Business Continuity Data Passwords Apple Remote Computing Server Disaster Recovery Employer-Employee Relationship Quick Tips Managed IT Services Marketing Hacking Outsourced IT Automation Mobile Device Management Health Big Data Network Virtualization History Apps Chrome IT Solutions The Internet of Things WiFi Small Business Antivirus Mobile Computing Going Green iPhone Productivity Operating System Remote Monitoring Router Office Tips Password Facebook App Gmail Wi-Fi Computers Application Bandwidth Excel Retail Data Management Search... Current Events VPN Applications Saving Money Artificial Intelligence Twitter Government Cybercrime Settings Maintenance Law Enforcement Website Spam Internet of Things Tablet Collaboration Gadgets PowerPoint Wireless Analytics Tech Term Physical Security Data Backup Biometrics Mobility Politics Google Drive Windows 10 Recovery Safety Telephone Systems Data Breach Social Engineering Patch Management Wireless Technology Lithium-ion battery Business Intelligence Entertainment Sports Phishing BYOD Office 365 Environment Mouse Virus VoIP Save Time Cloud Computing Networking Battery Workers Memory Best Practice Hiring/Firing Hosted Solution Laptop Access Control Printer Wearable Technology User Error Hard Drives Saving Time Printer Server Online Currency Phone System Programming Customer Relationship Management HIPAA Humor Tech Terms People Cleaning Bluetooth Education Wireless Charging DDoS Tech Support Cost Management Files Proactive IT Robot Licensing Tip of the week End of Support Data Protection Internet Exlporer Data storage Word Scam Streaming Media Company Culture Fax Server Avoiding Downtime How To Managed IT Services Two-factor Authentication Paperless Office Money IT Support Budget Shortcut Cortana Downtime Information Technology Vulnerability Smart Technology Windows 8 Blockchain Best Available eWaste Sales Tablets Dongle Debate Voice over IP Database IT budget Workplace Document Management WhatsApp Video Surveillance Movies Knowledge BDR Cabling eCommerce Touchpad Multi-Factor Security Touchscreen Tactics Google Maps Unified Communications Running Cable User Worker IT Management Digital Relocation News Techology Comparison Uninterrupted Power Supply Technology Tips Online Shopping Data Recovery Internet Explorer Botnet RAM USB Law Firm IT Telephone System HaaS Specifications Analyitcs Copy Backup and Disaster Recovery Social Windows Media Player Threat Managed IT Microsoft Teams Network Attached Storage Trending Flexibility Conferencing Paste SSD Social Networking Piracy Lead Generation Black Market Dark Web Printing Mobile Office G Suite Distributed Denial of Service Access Server Management Remote Support Legal Content Filtering Shadow IT Inventory Display Outlook Virtual Assistant Paper Meetings Printers Machine Learning Compliance Mobile Device User Tip Remote Control Mobile Security Customer Service Windows XP Administration WannaCry Skype Ink WIndows 7 Human Resources Staffing Telecommute Statistics Advertising File Sharing Video Games Telecommuting YouTube Spam Blocking e-waste Unified Threat Management Spotify Samsung Hard Drive Monitor Connectivity Risk Management Managing Stress User Security Encryption Windows 8.1 Update Data loss Virtual Reality Vendor Management Private Cloud Alerts Millennials NarrowBand Email Management Net Neutrality disposal Automobile Processors Reputation LinkedIn Downloads Business Technology Notifications Hacker Staff Bloatware PDF Work/Life Balance Managed IT Service Chromecast Value Computer Accessories Webcam Edge Crowdfunding Spyware Customers Travel Trends SharePoint Science Gadget Websites Entrepreneur Worker Commute Telephony Bring Your Own Device Cameras Consultant IT Consultant HP Live Streaming A.I.

Mobile? Grab this Article!

QR-Code

Recent Comments

Milli Philpson 3 Great Consumer Mobile Apps for Your Business
21 September 2017
According to my view for topic of mobile app is extremely stunning as well as useful for me. Because...