631-905-9617    Get SUPPORT

Suffolk Computer Consultants Blog

Suffolk Computer Consultants has been serving the Speonk area since 2013, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Improperly Disposing of a Hard Drive Can Threaten Your Security

Improperly Disposing of a Hard Drive Can Threaten Your Security

No technology lasts forever. Your business will need to replace server hardware or workstations eventually, no matter how well you take care of it. However, what do you do with the hard drive of any device that you have to replace? If you don’t take action to destroy your old hard drive (after moving any data off of it as needed), you could be in violation of various compliance guidelines issued by HIPAA.

Why is HIPAA Important?
The Health Insurance Portability and Accountability Act of 1996 accomplishes two major goals: protect the health insurance coverage of workers as they change their employment, and protect the privacy of health data. One of the best ways to protect data like this is to make sure that only a certain number of copies are available, and that none of them are sitting around and waiting for someone to steal them. Even if it’s just sitting around waiting to be recovered, the data is at risk.

The latter point is particularly important since medical professionals need to store each individual patient’s data on their systems. Doctors aren’t immune to the dangers of hardware failure, and if they carelessly chuck their old hard drives following a catastrophic failure of some sort, there could be serious consequences. HIPAA provides specific requirements that healthcare providers need to adhere to in order to avoid liability for any issues related to data privacy.

How Do You Destroy Your Data?
One oddity with HIPAA compliance is that it doesn’t provide organizations or healthcare providers with any specific way to destroy data. However, it does provide some suggestions. You can magnetize your hard drive to delete data, or you could just smash it into a billion little pieces. One other common way of destroying data on a hard drive is by taking a power drill to it, but any physical destruction of the drive will work sufficiently. In order to completely destroy your data, however, you’ll want to take a few more steps. One of the best ways to make sure that your organization is prepared to face HIPAA compliance is by working with a managed service provider. Instead of destroying the drive yourself, you can leave it up to the professionals to use specialized equipment to destroy the drive, eliminating any risk on your end.

Does your organization need assistance with keeping compliance issues at the top of mind? Suffolk Computer Consultants can help your organization ensure data compliance with your specific industry’s standards. To learn more, reach out to us at 631-905-9617.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, 23 April 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Cloud Privacy Best Practices Business Computing Technology Cybersecurity Managed IT Services Malware Hardware Communications Backup Ransomware Outsourced IT Business Network Security Hackers Email Save Money Wi-Fi Microsoft Software Business Management Smartphones Android Hosted Solutions Productivity Small Business Applications Alert Internet VoIP Passwords Smartphone Phishing Data Backup Router Windows 10 Password Cloud Computing Vulnerability Office Employer-Employee Relationship Miscellaneous Google Social Media Excel Data Breach Computer Communication VoIP Twitter Settings Microsoft Office Government IT Services Data Management Bandwidth Saving Money Virus Holiday Word Spam Mobile Device Management Business Continuity Scam Tech Terms Efficiency How To Automation BDR Data Physical Security Workers Apps Patch Management Productivity Gadgets Managed IT Services Browser Paperless Office IT Support IT Support Retail Innovation User Tips Chrome Law Enforcement Access Control Virtualization WiFi Battery Data Recovery Analytics Cortana Business Intelligence App Windows VPN Hacking Computers Office 365 Politics Website Remote Computing Tip of the week Remote Monitoring Hard Drive CrashOverride Spam Blocking IT Management Business Technology Telecommuting Hard Drives Dongle Processors News Email Management Mobile Devices Sales Entertainment Millennials Two-factor Authentication Spyware Recovery Telephone System Network Attached Storage Tablet Managed IT Service Staffing Technology Tips Tech Support Safety HP Spotify Information Technology Server Management Antivirus Knowledge Telephony Files Hiring/Firing Backup and Disaster Recovery Document Management Remote Support Collaboration Google Drive Biometrics Artificial Intelligence Company Culture Big Data Comparison Voice over IP Managed IT SSD Digital Automobile Office Tips Hosted Solution Access Machine Learning Specifications eCommerce Wireless Edge Cybercrime Apple Copy Multi-Factor Security BYOD Telecommute Conferencing Online Shopping Licensing Phone System Server Laptop Facebook iPhone Google Maps Paste Content Filtering Data loss Disaster Recovery Cleaning Wireless Charging Travel Blockchain Data Protection Gmail Staff Internet of Things WannaCry Marketing Lead Generation Live Streaming Gadget Telephone Systems File Sharing Education User Tip Dark Web Printer Server Websites Smart Technology HIPAA Virtual Assistant WhatsApp Shortcut Work/Life Balance Remote Control IT budget User Security Botnet Printers Networking Mobile Office Video Games Worker Domains Yahoo Television Printer Public Speaking Autocorrect Lithium-ion battery Avoiding Downtime Dark Data Augmented Reality Maintenance Leadership DDoS The Internet of Things Personal Information Money Budget Network Competition Employer Employee Relationship Fun SaaS Users Scalability Upgrade Synergy IaaS Encryption Emergency Inventory Credit Cards Mobile Device Search Windows 10 Emoji HaaS Vendor Management Mobile Security Presentation Unified Threat Management Scheduling 5G Current Events Wireless Technology Samsung Managed Service Provider IBM Hacker Computer Care Instagram Net Neutrality Customer Relationship Management IP Address Gaming Console Cost Management Freedom of Information Customer Service

Newsletter Sign Up