888.678.7282    Get SUPPORT

Strata Information Technology Blog

Improperly Disposing of a Hard Drive Can Threaten Your Security

Improperly Disposing of a Hard Drive Can Threaten Your Security

No technology lasts forever. Your business will need to replace server hardware or workstations eventually, no matter how well you take care of it. However, what do you do with the hard drive of any device that you have to replace? If you don’t take action to destroy your old hard drive (after moving any data off of it as needed), you could be in violation of various compliance guidelines issued by HIPAA.

Why is HIPAA Important?
The Health Insurance Portability and Accountability Act of 1996 accomplishes two major goals: protect the health insurance coverage of workers as they change their employment, and protect the privacy of health data. One of the best ways to protect data like this is to make sure that only a certain number of copies are available, and that none of them are sitting around and waiting for someone to steal them. Even if it’s just sitting around waiting to be recovered, the data is at risk.

The latter point is particularly important since medical professionals need to store each individual patient’s data on their systems. Doctors aren’t immune to the dangers of hardware failure, and if they carelessly chuck their old hard drives following a catastrophic failure of some sort, there could be serious consequences. HIPAA provides specific requirements that healthcare providers need to adhere to in order to avoid liability for any issues related to data privacy.

How Do You Destroy Your Data?
One oddity with HIPAA compliance is that it doesn’t provide organizations or healthcare providers with any specific way to destroy data. However, it does provide some suggestions. You can magnetize your hard drive to delete data, or you could just smash it into a billion little pieces. One other common way of destroying data on a hard drive is by taking a power drill to it, but any physical destruction of the drive will work sufficiently. In order to completely destroy your data, however, you’ll want to take a few more steps. One of the best ways to make sure that your organization is prepared to face HIPAA compliance is by working with a managed service provider. Instead of destroying the drive yourself, you can leave it up to the professionals to use specialized equipment to destroy the drive, eliminating any risk on your end.

Does your organization need assistance with keeping compliance issues at the top of mind? Strata Information Technology can help your organization ensure data compliance with your specific industry’s standards. To learn more, reach out to us at 888.678.7282.

ALERT: Meltdown/Spectre Vulnerability Can Affect Y...
Tip of the Week: How ‘StarWars’ Can Compromise You...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, December 11 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Business Computing Technology Managed IT Services Best Practices Privacy Cloud Internet Network Security Malware Cybersecurity Tech Term Hackers Communications Backup Microsoft IT Support Software Ransomware User Tips Business Management Outsourced IT VoIP Passwords Productivity Alert Smartphones Email Communication Data Recovery Productivity Browser IT Services Social Media Business Google Data Backup Windows 10 Efficiency Hosted Solutions Data Small Business Cloud Computing Phishing Users Network Hardware Save Money Business Continuity Apps Mobile Device Smartphone Microsoft Office Data Breach Vulnerability Miscellaneous Android Saving Money App Bandwidth Twitter Internet of Things Computer Compliance BDR Applications Law Enforcement Workplace Tips Blockchain Patch Management Workers Innovation Collaboration Office 365 Settings Employer-Employee Relationship Excel Remote Monitoring Scam Company Culture Cybercrime Networking Politics Mobile Device Management Access Control Government Wi-Fi Virtual Assistant Connectivity How To Facebook Entertainment Recovery Marketing Antivirus Maintenance Password Retail Holiday Office Website Computers Education Personal Information BYOD Automation Managed IT Service Vendor Management Dark Web Managing Stress Wireless Chrome SaaS Spam Virus Information Remote Monitoring and Management Word Windows Avoiding Downtime Movies Credit Cards Wireless Internet News Dark Data Spyware Value Television Information Technology Storage Multi-Factor Security Specifications Staffing Technology Efficiently Licensing Voice over IP Amazon Smart Technology Email Management Tech Terms Cortana Bring Your Own Device Printer iPhone HaaS Printer Server Tech Support Data loss Gadget Safety Help Desk Telephone System WannaCry Unified Threat Management HP Biometrics Error Streaming Media Outlook Travel Business Intelligence The Internet of Things Regulation Sales Managed Service Provider Cost Management Budget Troubleshooting Physical Security Technology Tips Hybrid Cloud WiFi Managed IT Cleaning Printers Gadgets Content Filtering Hiring/Firing Employer Employee Relationship Staff RAM Current Events Shortcut HIPAA Botnet VPN Document Management Database Leadership Access Touchscreen Router Downloads Managed Service Live Streaming Reporting Tablet VoIPMyths Files Battery Data Management Backup and Disaster Recovery Cables Plug-In Telephone Systems Data Protection Encryption Computer Care Gmail Automobile Websites Microsoft Teams Net Neutrality CrashOverride Remote Support Hard Drive Paperless Office Tactics Microsoft Office 365 Artificial Intelligence Trends Profitability WhatsApp Wireless Charging Synergy e-waste Disaster Recovery Upgrade Medical IT Knowledge VoIPSavings Yahoo SSD Voice over Internet Protocol Proactive IT Remote Control IT budget PowerPoint Gaming Console Processors Digital Internet Explorer Analytics Authentication A.I. Scalability Phone System Eliminating Downtime Lead Generation disposal GDPR Comparison Hard Drives Video Games Google Maps Update Emergency Telephony DDoS Inventory Mobile Devices IT Management Sports Authorization Dongle Worker Apple Edge Threat IaaS Two-factor Authentication Telecommute VoIP Lithium-ion battery Emoji Mobile Security Paste Augmented Reality Business Technology Instagram Quick Tips Remote Computing Samsung Wireless Technology 5G Money Laptop Printing Unified Communications IBM Conferencing Network Attached Storage Managed IT Services Hacker eCommerce Operating System Telecommuting Paper Competition Certification Customer Relationship Management Server Management IP Address Online Shopping Environment Big Data Millennials Fun Ink Customer Service Mobile Office Google Drive IT Support Hosted Solution Domains File Sharing User Tip Virtualization Autocorrect Machine Learning Copy Public Speaking Spam Blocking User Security Search Scheduling Tip of the week Server G Suite Windows 10 Presentation

Newsletter Sign Up