631-905-9617    Get SUPPORT

Suffolk Computer Consultants Blog

Improperly Disposing of a Hard Drive Can Threaten Your Security

Improperly Disposing of a Hard Drive Can Threaten Your Security

No technology lasts forever. Your business will need to replace server hardware or workstations eventually, no matter how well you take care of it. However, what do you do with the hard drive of any device that you have to replace? If you don’t take action to destroy your old hard drive (after moving any data off of it as needed), you could be in violation of various compliance guidelines issued by HIPAA.

Why is HIPAA Important?
The Health Insurance Portability and Accountability Act of 1996 accomplishes two major goals: protect the health insurance coverage of workers as they change their employment, and protect the privacy of health data. One of the best ways to protect data like this is to make sure that only a certain number of copies are available, and that none of them are sitting around and waiting for someone to steal them. Even if it’s just sitting around waiting to be recovered, the data is at risk.

The latter point is particularly important since medical professionals need to store each individual patient’s data on their systems. Doctors aren’t immune to the dangers of hardware failure, and if they carelessly chuck their old hard drives following a catastrophic failure of some sort, there could be serious consequences. HIPAA provides specific requirements that healthcare providers need to adhere to in order to avoid liability for any issues related to data privacy.

How Do You Destroy Your Data?
One oddity with HIPAA compliance is that it doesn’t provide organizations or healthcare providers with any specific way to destroy data. However, it does provide some suggestions. You can magnetize your hard drive to delete data, or you could just smash it into a billion little pieces. One other common way of destroying data on a hard drive is by taking a power drill to it, but any physical destruction of the drive will work sufficiently. In order to completely destroy your data, however, you’ll want to take a few more steps. One of the best ways to make sure that your organization is prepared to face HIPAA compliance is by working with a managed service provider. Instead of destroying the drive yourself, you can leave it up to the professionals to use specialized equipment to destroy the drive, eliminating any risk on your end.

Does your organization need assistance with keeping compliance issues at the top of mind? Suffolk Computer Consultants can help your organization ensure data compliance with your specific industry’s standards. To learn more, reach out to us at 631-905-9617.

ALERT: Meltdown/Spectre Vulnerability Can Affect Y...
Tip of the Week: How ‘StarWars’ Can Compromise You...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, October 20 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Business Computing Technology Best Practices Cloud Privacy Cybersecurity Network Security Managed IT Services Malware Tech Term Communications Productivity Backup Smartphones Microsoft Communication Hackers Hosted Solutions Business Hardware Passwords Outsourced IT Browser Efficiency User Tips Ransomware VoIP Internet Email Google Business Management Small Business Android Software Save Money Social Media Wi-Fi Alert Applications Router Microsoft Office Collaboration Innovation Miscellaneous Twitter Saving Money Internet of Things Smartphone Data Backup Employer-Employee Relationship Computer Bandwidth Data Recovery Data Windows 10 Cloud Computing Business Intelligence Patch Management Marketing Mobile Device Settings Data Breach Vulnerability Managed IT Services Gadgets Password BDR Users IT Support Workplace Tips Blockchain Access Control Excel Office Government IT Services Mobile Devices Network Automation Data Management Analytics Phishing VoIP Virtualization Apps Gmail Productivity Scam Information Business Continuity Tech Terms Battery Dark Web Website Office 365 Cortana Retail Virtual Assistant Chrome App Tip of the week Remote Computing VPN Hacking Workers Virus Compliance Wireless Spam Mobile Device Management Computers Word Paperless Office IT Support Cost Management Company Culture Artificial Intelligence Remote Monitoring How To Politics Law Enforcement Networking Wireless Charging Holiday Data Protection Windows Physical Security Managed IT Service WiFi Cybercrime Edge Threat Information Technology Microsoft Office 365 Dongle G Suite Gadget Processors Value Medical IT Knowledge Server Telecommute Movies Live Streaming Analysis Telephone Systems File Sharing Connectivity Printer Server Outlook Files Telephony Google Maps Lead Generation Mobile Security Remote Support Laptop Printing Entertainment Biometrics Authentication User Tip Big Data Bring Your Own Device Facebook Shortcut Amazon Spyware Disaster Recovery GDPR Google Drive Comparison Data loss Unified Communications Recovery WhatsApp Maintenance Managed Service Remote Control User Security Network Attached Storage Streaming Media Cleaning Printers Voice over IP Operating System Hosted Solution Paper Access Authorization Spotify Technology Tips Hybrid Cloud CrashOverride HP Database Storage Specifications Staff RAM Environment Antivirus Spam Blocking Business Technology Hiring/Firing Server Management Downloads eCommerce WannaCry Plug-In Copy Apple Ink BYOD Telecommuting Backup and Disaster Recovery Document Management Tactics Education Smart Technology Error Multi-Factor Security Conferencing Work/Life Balance Websites Microsoft Teams Phone System Cables News HIPAA e-waste Email Management Sales Managed IT Trends Licensing Online Shopping Two-factor Authentication Proactive IT Paste iPhone Botnet IT budget PowerPoint SaaS Troubleshooting Millennials Office Tips Automobile SSD Telephone System Digital Internet Explorer Touchscreen Content Filtering Managing Stress Voice over Internet Protocol Hard Drive disposal Reporting Tablet Machine Learning A.I. Staffing Travel Tech Support Remote Monitoring and Management Safety Hard Drives IT Management Sports Update Inventory Hacker Search Television The Internet of Things Credit Cards Emoji Vendor Management Budget Printer Competition Autocorrect HaaS Customer Relationship Management IP Address Avoiding Downtime Unified Threat Management Scheduling Dark Data Customer Service Samsung Mobile Office Managed Service Provider Leadership Upgrade Current Events DDoS Domains Instagram Money Computer Care Emergency Personal Information Quick Tips Windows 10 Employer Employee Relationship Net Neutrality Fun Public Speaking Regulation Presentation Gaming Console Freedom of Information Lithium-ion battery Augmented Reality Scalability Synergy Wireless Technology 5G Encryption Video Games Yahoo IaaS IBM Worker

Newsletter Sign Up