631-905-9617    Get SUPPORT

Suffolk Computer Consultants Blog

Suffolk Computer Consultants has been serving the Speonk area since 2013, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Improperly Disposing of a Hard Drive Can Threaten Your Security

Improperly Disposing of a Hard Drive Can Threaten Your Security

No technology lasts forever. Your business will need to replace server hardware or workstations eventually, no matter how well you take care of it. However, what do you do with the hard drive of any device that you have to replace? If you don’t take action to destroy your old hard drive (after moving any data off of it as needed), you could be in violation of various compliance guidelines issued by HIPAA.

Why is HIPAA Important?
The Health Insurance Portability and Accountability Act of 1996 accomplishes two major goals: protect the health insurance coverage of workers as they change their employment, and protect the privacy of health data. One of the best ways to protect data like this is to make sure that only a certain number of copies are available, and that none of them are sitting around and waiting for someone to steal them. Even if it’s just sitting around waiting to be recovered, the data is at risk.

The latter point is particularly important since medical professionals need to store each individual patient’s data on their systems. Doctors aren’t immune to the dangers of hardware failure, and if they carelessly chuck their old hard drives following a catastrophic failure of some sort, there could be serious consequences. HIPAA provides specific requirements that healthcare providers need to adhere to in order to avoid liability for any issues related to data privacy.

How Do You Destroy Your Data?
One oddity with HIPAA compliance is that it doesn’t provide organizations or healthcare providers with any specific way to destroy data. However, it does provide some suggestions. You can magnetize your hard drive to delete data, or you could just smash it into a billion little pieces. One other common way of destroying data on a hard drive is by taking a power drill to it, but any physical destruction of the drive will work sufficiently. In order to completely destroy your data, however, you’ll want to take a few more steps. One of the best ways to make sure that your organization is prepared to face HIPAA compliance is by working with a managed service provider. Instead of destroying the drive yourself, you can leave it up to the professionals to use specialized equipment to destroy the drive, eliminating any risk on your end.

Does your organization need assistance with keeping compliance issues at the top of mind? Suffolk Computer Consultants can help your organization ensure data compliance with your specific industry’s standards. To learn more, reach out to us at 631-905-9617.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 21 January 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Cloud Privacy Business Computing Technology Communications Best Practices Malware Cybersecurity Outsourced IT Managed IT Services Backup Business Microsoft Software Hackers Productivity Smartphones Hardware Hosted Solutions Small Business Alert Network Security VoIP Passwords Settings Save Money Business Management Office Router Ransomware Email Windows 10 Data Breach Vulnerability Miscellaneous Google Smartphone Excel Computer Phishing Android Microsoft Office VoIP IT Services Windows Office 365 Website Remote Monitoring Saving Money Workers Tip of the week Mobile Device Management IT Support Password Word Data Backup Law Enforcement Apps How To Productivity WiFi Gadgets Cloud Computing Patch Management Applications Battery Employer-Employee Relationship Managed IT Services User Tips Twitter Social Media App Virtualization Retail IT Support Chrome Government Internet Access Control Wi-Fi Politics Cortana Communication Bandwidth Holiday Hacking Business Continuity Scam Data Protection Business Intelligence Efficiency HIPAA Gmail Work/Life Balance Entertainment Live Streaming Recovery Gadget Lead Generation File Sharing Telephone Systems Printer Server Hard Drive User Tip Dark Web WhatsApp Shortcut Virtual Assistant User Security Remote Control Spam Printers Processors Remote Computing Virus CrashOverride Paperless Office Business Technology Company Culture Spam Blocking Two-factor Authentication Managed IT Spyware Telecommuting News Automobile Office Tips Sales Email Management Tech Support Automation HP Millennials Spotify Telephone System Cybercrime Tablet Hiring/Firing Browser Staffing Managed IT Service Physical Security Google Maps Knowledge Disaster Recovery Innovation Information Technology Cleaning Telephony Files Remote Support Collaboration Comparison Internet of Things Google Drive Biometrics Wireless Voice over IP Hosted Solution Specifications Server Smart Technology Education Access eCommerce Apple Copy Data Management Botnet Conferencing Multi-Factor Security BYOD Licensing Phone System Online Shopping iPhone Paste Analytics Marketing WannaCry Content Filtering Data Recovery Travel Wireless Charging Printer Customer Relationship Management Autocorrect IP Address Avoiding Downtime Maintenance Customer Service Dark Data Leadership Mobile Office Domains DDoS Hard Drives Antivirus Personal Information Money Mobile Devices Network Public Speaking Employer Employee Relationship Lithium-ion battery SaaS Augmented Reality Scalability Data Synergy Safety IaaS Encryption Credit Cards The Internet of Things Mobile Device Budget Emoji HaaS Competition Vendor Management Document Management Fun Facebook Big Data Users Unified Threat Management Scheduling Digital Current Events Upgrade Samsung VPN Computer Care Instagram Edge Search Net Neutrality Windows 10 Gaming Console Presentation Cost Management Emergency Freedom of Information 5G Video Games Wireless Technology Managed Service Provider Worker IBM Yahoo Hacker Television

Newsletter Sign Up