(978) 993-8038 facebook twitter linkedin google youtube pinterest rss

Patrick Agostino

Resolve I.T.™ has been serving the Beverly area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Improperly Disposing of a Hard Drive Can Threaten Your Security

Improperly Disposing of a Hard Drive Can Threaten Your Security

No technology lasts forever. Your business will need to replace server hardware or workstations eventually, no matter how well you take care of it. However, what do you do with the hard drive of any device that you have to replace? If you don’t take action to destroy your old hard drive (after moving any data off of it as needed), you could be in violation of various compliance guidelines issued by HIPAA.

Why is HIPAA Important?
The Health Insurance Portability and Accountability Act of 1996 accomplishes two major goals: protect the health insurance coverage of workers as they change their employment, and protect the privacy of health data. One of the best ways to protect data like this is to make sure that only a certain number of copies are available, and that none of them are sitting around and waiting for someone to steal them. Even if it’s just sitting around waiting to be recovered, the data is at risk.

The latter point is particularly important since medical professionals need to store each individual patient’s data on their systems. Doctors aren’t immune to the dangers of hardware failure, and if they carelessly chuck their old hard drives following a catastrophic failure of some sort, there could be serious consequences. HIPAA provides specific requirements that healthcare providers need to adhere to in order to avoid liability for any issues related to data privacy.

How Do You Destroy Your Data?
One oddity with HIPAA compliance is that it doesn’t provide organizations or healthcare providers with any specific way to destroy data. However, it does provide some suggestions. You can magnetize your hard drive to delete data, or you could just smash it into a billion little pieces. One other common way of destroying data on a hard drive is by taking a power drill to it, but any physical destruction of the drive will work sufficiently. In order to completely destroy your data, however, you’ll want to take a few more steps. One of the best ways to make sure that your organization is prepared to face HIPAA compliance is by working with a managed service provider. Instead of destroying the drive yourself, you can leave it up to the professionals to use specialized equipment to destroy the drive, eliminating any risk on your end.

Does your organization need assistance with keeping compliance issues at the top of mind? Resolve I.T.™ can help your organization ensure data compliance with your specific industry’s standards. To learn more, reach out to us at (978) 993-8038.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 19 December 2018
If you'd like to register, please fill in the username, password and name fields.

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Microsoft Cloud Business Computing Internet Productivity Hackers Google Malware Efficiency Miscellaneous Backup Smartphones Hosted Solutions Business Mobile Devices Software User Tips Network Security Business Management IT Support Email Workplace Tips IT Services Android Browser Windows Smartphone Innovation Hardware Microsoft Office Communications Communication Upgrade Windows 10 Social Media VoIP Save Money Holiday Cybersecurity Passwords Network Alert Computer Productivity Ransomware Business Continuity Office Marketing Managed IT Services Tech Term Data Managed Service Provider Employer-Employee Relationship Apple Remote Computing Server Disaster Recovery Outsourced IT Automation Quick Tips Small Business Virtualization Health Mobile Device Management Apps Big Data Hacking WiFi Saving Money Data Backup IT Solutions Bandwidth The Internet of Things Wi-Fi Antivirus Internet of Things Mobile Computing Going Green Mobile Device iPhone Operating System Chrome Remote Monitoring History IT Support Cloud Computing Router Office Tips Password Facebook Application Windows 10 Gmail Excel Applications Networking Retail Data Recovery Gadgets Collaboration App Analytics Wireless Computers Spam Physical Security Current Events VPN BYOD Artificial Intelligence PowerPoint Data Management Maintenance Government Cybercrime Settings Tablet Law Enforcement Mobility Search... Business Intelligence Users Twitter Website Managed IT Services Lithium-ion battery Entertainment VoIP Battery Compliance Biometrics Google Drive Workers Access Control Mouse Virus Wireless Technology Politics Recovery Safety Telephone Systems Proactive IT Sports Save Time Data Breach Memory Phishing Company Culture Patch Management Office 365 Information Environment Blockchain Social Engineering Smart Technology Saving Time Remote Monitoring and Management Information Technology BDR Licensing Touchscreen Outlook Bring Your Own Device Managed IT Service eWaste Online Currency Best Practice Hosted Solution Cortana Laptop Vulnerability Tech Terms User Error Managed Service Bluetooth Managing Stress Avoiding Downtime Money HIPAA Budget Cleaning Downtime DDoS Cost Management Tech Support Wireless Charging Files Robot Printer Hiring/Firing Connectivity Hard Drives End of Support Dark Web Scam Printer Server Internet Exlporer Data storage Virtual Assistant Phone System Tip of the week Programming Streaming Media Fax Server Humor Data Protection Customer Relationship Management People Paperless Office Word Education Two-factor Authentication Best Available Windows 8 How To Shortcut Wearable Technology Millennials Movies Customers Email Management IT budget SharePoint Video Surveillance Processors Entrepreneur Troubleshooting Business Technology Tactics Unified Communications IT Management Spyware Analysis Travel Technology Tips SaaS Gadget Update WIndows 7 Internet Explorer Administration Telephony RAM Law Firm IT Statistics Google Maps Human Resources HP Unified Threat Management Live Streaming Backup and Disaster Recovery Samsung Profitability Cabling Sales Threat Touchpad Voice over IP Microsoft Teams Vendor Management Relocation Network Attached Storage Running Cable Botnet Reporting Techology WhatsApp SSD Uninterrupted Power Supply Eliminating Downtime Knowledge Printing eCommerce G Suite Multi-Factor Security Server Management Managed IT Hacker Medical IT Computer Accessories HaaS News Inventory Worker Social Crowdfunding Wireless Internet Display Comparison Paper Online Shopping Hybrid Cloud Worker Commute Machine Learning Science Social Networking GDPR Cameras Flexibility Telephone System Mobile Security Black Market Copy Mobile Office Skype Help Desk Consultant Specifications Ink Tablets Cables Telecommute Debate Distributed Denial of Service Storage Legal e-waste Shadow IT Workplace Paste Document Management Meetings Windows XP Certification Conferencing Windows 8.1 Update Lead Generation Voice over Internet Protocol Data loss Customer Service Net Neutrality Error Remote Support disposal Access Digital Spotify LinkedIn User Content Filtering Downloads Advertising Staff Microsoft Office 365 Video Games Value YouTube Printers Trends Monitor Remote Control Edge Risk Management USB User Tip Analyitcs WannaCry Amazon Windows Media Player Private Cloud Websites Encryption Virtual Reality Authentication Alerts File Sharing NarrowBand Staffing A.I. Reputation IT Consultant Spam Blocking Trending Webcam Telecommuting Hard Drive Plug-In PDF Dongle Piracy Notifications Automobile Bloatware Authorization Work/Life Balance User Security Database Chromecast

Mobile? Grab this Article!

QR-Code

Recent Comments

Milli Philpson 3 Great Consumer Mobile Apps for Your Business
21 September 2017
According to my view for topic of mobile app is extremely stunning as well as useful for me. Because...