888.678.7282    Get SUPPORT

Strata Information Technology Blog

Strata Information Technology has been serving the Encino area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Improperly Disposing of a Hard Drive Can Threaten Your Security

Improperly Disposing of a Hard Drive Can Threaten Your Security

No technology lasts forever. Your business will need to replace server hardware or workstations eventually, no matter how well you take care of it. However, what do you do with the hard drive of any device that you have to replace? If you don’t take action to destroy your old hard drive (after moving any data off of it as needed), you could be in violation of various compliance guidelines issued by HIPAA.

Why is HIPAA Important?
The Health Insurance Portability and Accountability Act of 1996 accomplishes two major goals: protect the health insurance coverage of workers as they change their employment, and protect the privacy of health data. One of the best ways to protect data like this is to make sure that only a certain number of copies are available, and that none of them are sitting around and waiting for someone to steal them. Even if it’s just sitting around waiting to be recovered, the data is at risk.

The latter point is particularly important since medical professionals need to store each individual patient’s data on their systems. Doctors aren’t immune to the dangers of hardware failure, and if they carelessly chuck their old hard drives following a catastrophic failure of some sort, there could be serious consequences. HIPAA provides specific requirements that healthcare providers need to adhere to in order to avoid liability for any issues related to data privacy.

How Do You Destroy Your Data?
One oddity with HIPAA compliance is that it doesn’t provide organizations or healthcare providers with any specific way to destroy data. However, it does provide some suggestions. You can magnetize your hard drive to delete data, or you could just smash it into a billion little pieces. One other common way of destroying data on a hard drive is by taking a power drill to it, but any physical destruction of the drive will work sufficiently. In order to completely destroy your data, however, you’ll want to take a few more steps. One of the best ways to make sure that your organization is prepared to face HIPAA compliance is by working with a managed service provider. Instead of destroying the drive yourself, you can leave it up to the professionals to use specialized equipment to destroy the drive, eliminating any risk on your end.

Does your organization need assistance with keeping compliance issues at the top of mind? Strata Information Technology can help your organization ensure data compliance with your specific industry’s standards. To learn more, reach out to us at 888.678.7282.

ALERT: Meltdown/Spectre Vulnerability Can Affect Y...
Tip of the Week: How ‘StarWars’ Can Compromise You...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, 21 March 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Privacy Business Computing Managed IT Services Cloud Technology Malware Hackers Best Practices Ransomware Productivity Communications Outsourced IT Alert VoIP Internet Software Cybersecurity Backup Phishing IT Support Business Windows 10 Smartphone Data Breach Microsoft Vulnerability Passwords Android IT Services Save Money App Smartphones Email Business Management Network Security Cloud Computing Scam Excel Politics Microsoft Office Government Office 365 Remote Monitoring Business Continuity Saving Money Mobile Device Management Hardware Workers Data Small Business Settings Law Enforcement User Tips Miscellaneous Google Social Media Applications Patch Management Password Computer Retail Communication Education Mobile Device Bandwidth Chrome Access Control Efficiency Website Entertainment Spam Recovery Antivirus Hosted Solutions Holiday Office Personal Information Apps Vendor Management Productivity Cybercrime Twitter Virus Data Backup Browser Windows Employer-Employee Relationship Word How To Unified Threat Management Telephone System WannaCry Printers Cleaning Sales Blockchain Staff Current Events Physical Security VPN Botnet HIPAA Computers Computer Care Tablet Cortana Net Neutrality Data Management Files Remote Support Collaboration Disaster Recovery Hard Drive IT budget Managed Service Provider Automation Gaming Console Knowledge Managed IT Service Marketing Yahoo Processors IT Management Video Games Comparison Emergency Phone System Battery Worker Telephony Information Technology Spyware Television Apple Specifications Avoiding Downtime Multi-Factor Security Licensing Printer Voice over IP Biometrics HP iPhone Data Recovery Travel Gadget DDoS Maintenance Access Leadership WiFi Managed IT Document Management Two-factor Authentication Content Filtering Employer Employee Relationship Live Streaming Shortcut BYOD Data Protection Encryption Telephone Systems Paperless Office Tech Support Network Gmail Automobile Synergy WhatsApp CrashOverride Company Culture Analytics The Internet of Things SaaS Remote Control Digital Hiring/Firing Budget Scalability Gadgets Dark Web Internet of Things Lead Generation IaaS Edge Google Maps Innovation Credit Cards Users News Dark Data Smart Technology Virtual Assistant Printer Server HaaS Email Management Staffing Data loss Facebook Wireless Search Cost Management Managed IT Services Server Telecommuting Presentation Wi-Fi Websites Millennials Wireless Technology 5G IBM Google Drive Hacker IT Support Autocorrect Hosted Solution Customer Relationship Management IP Address Copy Tech Terms Customer Service VoIP Mobile Office Domains Money Paste Network Attached Storage Hard Drives Conferencing eCommerce Public Speaking Business Intelligence Mobile Devices Server Management Router Lithium-ion battery Online Shopping Augmented Reality Artificial Intelligence Safety Wireless Charging File Sharing Machine Learning User Tip Competition Fun Big Data User Security Scheduling Spam Blocking Telecommute Tip of the week Emoji Windows 10 Upgrade Business Technology Instagram Laptop Virtualization Remote Computing Samsung

Newsletter Sign Up