888.678.7282    Get SUPPORT

Strata Information Technology Blog

Strata Information Technology has been serving the Encino area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Improperly Disposing of a Hard Drive Can Threaten Your Security

Improperly Disposing of a Hard Drive Can Threaten Your Security

No technology lasts forever. Your business will need to replace server hardware or workstations eventually, no matter how well you take care of it. However, what do you do with the hard drive of any device that you have to replace? If you don’t take action to destroy your old hard drive (after moving any data off of it as needed), you could be in violation of various compliance guidelines issued by HIPAA.

Why is HIPAA Important?
The Health Insurance Portability and Accountability Act of 1996 accomplishes two major goals: protect the health insurance coverage of workers as they change their employment, and protect the privacy of health data. One of the best ways to protect data like this is to make sure that only a certain number of copies are available, and that none of them are sitting around and waiting for someone to steal them. Even if it’s just sitting around waiting to be recovered, the data is at risk.

The latter point is particularly important since medical professionals need to store each individual patient’s data on their systems. Doctors aren’t immune to the dangers of hardware failure, and if they carelessly chuck their old hard drives following a catastrophic failure of some sort, there could be serious consequences. HIPAA provides specific requirements that healthcare providers need to adhere to in order to avoid liability for any issues related to data privacy.

How Do You Destroy Your Data?
One oddity with HIPAA compliance is that it doesn’t provide organizations or healthcare providers with any specific way to destroy data. However, it does provide some suggestions. You can magnetize your hard drive to delete data, or you could just smash it into a billion little pieces. One other common way of destroying data on a hard drive is by taking a power drill to it, but any physical destruction of the drive will work sufficiently. In order to completely destroy your data, however, you’ll want to take a few more steps. One of the best ways to make sure that your organization is prepared to face HIPAA compliance is by working with a managed service provider. Instead of destroying the drive yourself, you can leave it up to the professionals to use specialized equipment to destroy the drive, eliminating any risk on your end.

Does your organization need assistance with keeping compliance issues at the top of mind? Strata Information Technology can help your organization ensure data compliance with your specific industry’s standards. To learn more, reach out to us at 888.678.7282.

ALERT: Meltdown/Spectre Vulnerability Can Affect Y...
Tip of the Week: How ‘StarWars’ Can Compromise You...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 18 January 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Privacy Business Computing Managed IT Services Cloud Malware Hackers Technology Best Practices Productivity Communications Outsourced IT Alert Ransomware Backup VoIP Software Phishing Cybersecurity IT Support Business Internet Data Breach Android App Smartphones Vulnerability Windows 10 Microsoft Network Security Passwords Microsoft Office IT Services Smartphone Office 365 Remote Monitoring Saving Money Settings Scam Politics Mobile Device Management Hardware Government Save Money Email Business Continuity Small Business Law Enforcement Workers Miscellaneous User Tips Google Business Management Social Media Excel Mobile Device Website Education Bandwidth Data Backup Hosted Solutions Efficiency Word Data Entertainment Apps How To Recovery Applications Productivity Cloud Computing Patch Management Holiday Office Personal Information Retail Vendor Management Chrome Cybercrime Access Control Twitter Windows Computer Communication Marketing Data Recovery Unified Threat Management Cleaning Gadget Printers Travel WiFi Current Events Botnet Content Filtering Battery VPN Computer Care Shortcut Live Streaming Data Protection Net Neutrality Telephone Systems Data Management Gmail Disaster Recovery Gaming Console CrashOverride Automation WhatsApp Remote Control Yahoo Spam Dark Web DDoS Virus Video Games Lead Generation Worker Two-factor Authentication Television Google Maps Information Technology News Avoiding Downtime Virtual Assistant Printer Email Management Tech Support Staffing Biometrics Telephone System The Internet of Things WannaCry Budget Gadgets Sales Maintenance Hiring/Firing Antivirus Leadership Browser Managed IT Access Physical Security Password Employer Employee Relationship HIPAA Innovation Users Tablet Employer-Employee Relationship Encryption BYOD Files Remote Support Network Collaboration Automobile Hard Drive Knowledge Company Culture Synergy SaaS Managed IT Service Analytics Scalability Processors Comparison Internet of Things IaaS Phone System Telephony Emergency Apple Credit Cards Dark Data Specifications Smart Technology Multi-Factor Security Cortana HaaS Voice over IP Printer Server Licensing iPhone Facebook Managed Service Provider Hacker Conferencing Cost Management eCommerce Business Intelligence Customer Relationship Management IP Address Router Online Shopping Customer Service Mobile Office Domains Wireless Charging File Sharing Hard Drives Autocorrect User Tip Mobile Devices Public Speaking User Security Spam Blocking Lithium-ion battery Tip of the week Windows 10 Augmented Reality Business Technology Safety Money Remote Computing Managed IT Services Competition Telecommuting Fun Big Data Millennials Upgrade Google Drive Virtualization Wireless IT Support Hosted Solution Search Server Wi-Fi Scheduling Presentation Copy Spyware Emoji VoIP 5G Instagram Wireless Technology Paste Samsung IBM HP

Newsletter Sign Up