631-905-9617    Get SUPPORT

Suffolk Computer Consultants Blog

Suffolk Computer Consultants has been serving the Speonk area since 2013, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Improperly Disposing of a Hard Drive Can Threaten Your Security

Improperly Disposing of a Hard Drive Can Threaten Your Security

No technology lasts forever. Your business will need to replace server hardware or workstations eventually, no matter how well you take care of it. However, what do you do with the hard drive of any device that you have to replace? If you don’t take action to destroy your old hard drive (after moving any data off of it as needed), you could be in violation of various compliance guidelines issued by HIPAA.

Why is HIPAA Important?
The Health Insurance Portability and Accountability Act of 1996 accomplishes two major goals: protect the health insurance coverage of workers as they change their employment, and protect the privacy of health data. One of the best ways to protect data like this is to make sure that only a certain number of copies are available, and that none of them are sitting around and waiting for someone to steal them. Even if it’s just sitting around waiting to be recovered, the data is at risk.

The latter point is particularly important since medical professionals need to store each individual patient’s data on their systems. Doctors aren’t immune to the dangers of hardware failure, and if they carelessly chuck their old hard drives following a catastrophic failure of some sort, there could be serious consequences. HIPAA provides specific requirements that healthcare providers need to adhere to in order to avoid liability for any issues related to data privacy.

How Do You Destroy Your Data?
One oddity with HIPAA compliance is that it doesn’t provide organizations or healthcare providers with any specific way to destroy data. However, it does provide some suggestions. You can magnetize your hard drive to delete data, or you could just smash it into a billion little pieces. One other common way of destroying data on a hard drive is by taking a power drill to it, but any physical destruction of the drive will work sufficiently. In order to completely destroy your data, however, you’ll want to take a few more steps. One of the best ways to make sure that your organization is prepared to face HIPAA compliance is by working with a managed service provider. Instead of destroying the drive yourself, you can leave it up to the professionals to use specialized equipment to destroy the drive, eliminating any risk on your end.

Does your organization need assistance with keeping compliance issues at the top of mind? Suffolk Computer Consultants can help your organization ensure data compliance with your specific industry’s standards. To learn more, reach out to us at 631-905-9617.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, July 16 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Best Practices Business Computing Cloud Privacy Technology Cybersecurity Managed IT Services Network Security Malware Backup Communications Hardware Microsoft Hackers Business Management Ransomware Outsourced IT Business Alert VoIP Wi-Fi Passwords Software Smartphones Android Email Small Business Productivity Save Money Tech Term Internet Computer Communication Twitter Smartphone Router Hosted Solutions Applications Employer-Employee Relationship Google Social Media Data Breach Data Recovery VoIP Business Intelligence Settings Microsoft Office IT Services Government Data Management Bandwidth Phishing Data Backup Mobile Devices Password Windows 10 Cloud Computing Data Patch Management Apps Vulnerability Collaboration Office Innovation IT Support Miscellaneous Excel Law Enforcement Wireless Artificial Intelligence WiFi Cybercrime Analytics Wireless Charging Cortana Data Protection Battery Gmail Windows Hacking VPN App Internet of Things Virtual Assistant Blockchain Office 365 Website Remote Computing Tip of the week Cost Management Remote Monitoring Saving Money Politics Virus Computers Spam Word Holiday Mobile Device Management Networking Business Continuity How To Scam Automation Efficiency Managed IT Service Physical Security Tech Terms Productivity Managed IT Services Gadgets BDR Workers Browser Retail Paperless Office Network Chrome IT Support User Tips Company Culture Access Control Virtualization Document Management Apple Copy Tactics Trends Conferencing Multi-Factor Security BYOD Phone System Voice over Internet Protocol SSD Online Shopping Licensing Server Digital iPhone Paste Internet Explorer A.I. Machine Learning Content Filtering Google Maps Information Inventory Facebook Travel Edge Threat Disaster Recovery Movies Telecommute Cleaning Gadget Amazon Marketing Mobile Security Lead Generation Live Streaming Laptop File Sharing Telephone Systems Printing Unified Communications Data loss User Tip Dark Web Printer Server Work/Life Balance Shortcut Workplace Tips Operating System WhatsApp User Security Education Remote Control Paper Smart Technology RAM Staff Printers CrashOverride Environment WannaCry Business Technology Spam Blocking Botnet Ink Microsoft Teams Websites Telecommuting Hard Drives e-waste HIPAA News IT budget Sales Email Management PowerPoint Two-factor Authentication Managing Stress Millennials disposal Hard Drive Telephone System IT Management Tablet Entertainment Sports Tech Support G Suite Dongle Recovery Staffing Spotify Safety Value Maintenance Processors Knowledge Information Technology Connectivity Bring Your Own Device Telephony Files Hiring/Firing Remote Support Antivirus Spyware Network Attached Storage Comparison Google Drive Biometrics Big Data Streaming Media Hybrid Cloud Users Technology Tips Voice over IP Hosted Solution Database HP Downloads Server Management Specifications Managed IT Access Office Tips Cables Backup and Disaster Recovery eCommerce Automobile Synergy IaaS Encryption Search Windows 10 Credit Cards Emoji Mobile Device Presentation HaaS Vendor Management Unified Threat Management 5G Wireless Technology Scheduling Managed Service Provider IBM Hacker Current Events Samsung Computer Care Instagram Customer Relationship Management IP Address Net Neutrality Customer Service Gaming Console Freedom of Information Mobile Office Plug-In Domains Video Games Proactive IT Worker Yahoo Television Public Speaking Lithium-ion battery Remote Monitoring and Management Printer Autocorrect Augmented Reality Avoiding Downtime Dark Data Leadership The Internet of Things Budget DDoS Competition Personal Information Money Fun Employer Employee Relationship SaaS Upgrade Scalability Emergency

Newsletter Sign Up