888.678.7282    Get SUPPORT

Strata Information Technology Blog

Strata Information Technology has been serving the Encino area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Improperly Disposing of a Hard Drive Can Threaten Your Security

Improperly Disposing of a Hard Drive Can Threaten Your Security

No technology lasts forever. Your business will need to replace server hardware or workstations eventually, no matter how well you take care of it. However, what do you do with the hard drive of any device that you have to replace? If you don’t take action to destroy your old hard drive (after moving any data off of it as needed), you could be in violation of various compliance guidelines issued by HIPAA.

Why is HIPAA Important?
The Health Insurance Portability and Accountability Act of 1996 accomplishes two major goals: protect the health insurance coverage of workers as they change their employment, and protect the privacy of health data. One of the best ways to protect data like this is to make sure that only a certain number of copies are available, and that none of them are sitting around and waiting for someone to steal them. Even if it’s just sitting around waiting to be recovered, the data is at risk.

The latter point is particularly important since medical professionals need to store each individual patient’s data on their systems. Doctors aren’t immune to the dangers of hardware failure, and if they carelessly chuck their old hard drives following a catastrophic failure of some sort, there could be serious consequences. HIPAA provides specific requirements that healthcare providers need to adhere to in order to avoid liability for any issues related to data privacy.

How Do You Destroy Your Data?
One oddity with HIPAA compliance is that it doesn’t provide organizations or healthcare providers with any specific way to destroy data. However, it does provide some suggestions. You can magnetize your hard drive to delete data, or you could just smash it into a billion little pieces. One other common way of destroying data on a hard drive is by taking a power drill to it, but any physical destruction of the drive will work sufficiently. In order to completely destroy your data, however, you’ll want to take a few more steps. One of the best ways to make sure that your organization is prepared to face HIPAA compliance is by working with a managed service provider. Instead of destroying the drive yourself, you can leave it up to the professionals to use specialized equipment to destroy the drive, eliminating any risk on your end.

Does your organization need assistance with keeping compliance issues at the top of mind? Strata Information Technology can help your organization ensure data compliance with your specific industry’s standards. To learn more, reach out to us at 888.678.7282.

ALERT: Meltdown/Spectre Vulnerability Can Affect Y...
Tip of the Week: How ‘StarWars’ Can Compromise You...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, June 24 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Business Computing Managed IT Services Privacy Technology Best Practices Cloud Cybersecurity Malware Ransomware Hackers Backup Productivity Communications Outsourced IT Internet Alert Business Management Network Security VoIP Software Smartphones Save Money Hardware IT Support Business Social Media Microsoft Passwords Phishing App Email Tech Term Data Twitter Windows 10 Vulnerability Smartphone Data Breach Android IT Services Office 365 Politics Bandwidth Remote Monitoring Saving Money Government Mobile Device Management Business Continuity Small Business Settings Law Enforcement Workers Apps Productivity Data Backup Miscellaneous User Tips Cybercrime Google Cloud Computing Patch Management Computer Excel Microsoft Office Scam Website Efficiency Spam Data Recovery Entertainment Hosted Solutions Recovery BDR Antivirus Maintenance Holiday Office Personal Information Virus Browser Company Culture Employer-Employee Relationship Innovation Vendor Management Word Internet of Things Windows How To Applications Password Wi-Fi Facebook Retail Communication Collaboration Blockchain Mobile Device Chrome Education Computers Access Control Spyware Apple e-waste Yahoo PowerPoint IT budget Specifications Multi-Factor Security Licensing Managing Stress Video Games Networking Voice over IP HP iPhone Worker disposal Information Technology Sports Television IT Management Hard Drives Travel DDoS Gadget Dongle Avoiding Downtime WiFi Business Intelligence Mobile Devices Printer Value Biometrics Connectivity Two-factor Authentication Tech Terms Content Filtering Router Live Streaming Shortcut Bring Your Own Device Data Protection Telephone Systems Access Streaming Media Tech Support Leadership Managed IT Gmail WhatsApp CrashOverride Hybrid Cloud Safety Technology Tips Employer Employee Relationship Wireless Charging Document Management Remote Control Database The Internet of Things Hiring/Firing BYOD Downloads Budget Gadgets Encryption Dark Web Network Backup and Disaster Recovery Automobile Lead Generation Tactics Synergy Paperless Office Google Maps Analytics Trends SaaS Artificial Intelligence Users News Scalability SSD Virtual Assistant Internet Explorer Digital Email Management Staffing A.I. IaaS Telephone System Wireless Credit Cards Inventory WannaCry Threat Edge Dark Data Sales Smart Technology Printer Server Movies HaaS Physical Security HIPAA Unified Threat Management Tablet Cortana Printers Cleaning Data loss Cost Management Files Remote Support Current Events Hard Drive VPN Botnet Knowledge Managed Service Provider RAM Computer Care Staff Marketing Managed IT Service Net Neutrality Data Management Processors Comparison Disaster Recovery Battery Phone System Automation Microsoft Teams Gaming Console Websites Telephony Emergency Copy Customer Service Autocorrect VoIP Mobile Office Paste Domains Conferencing G Suite eCommerce Public Speaking Money Lithium-ion battery Online Shopping Augmented Reality Network Attached Storage File Sharing Server Management User Tip Cables Competition Big Data User Security Spam Blocking Fun Tip of the week Windows 10 Voice over Internet Protocol Upgrade Business Technology Virtualization Machine Learning Scheduling Remote Computing Emoji Search Server Managed IT Services Telecommute Instagram Telecommuting Mobile Security Presentation Samsung Printing Laptop Unified Communications Millennials 5G Operating System Wireless Technology Paper IBM Google Drive Hacker IT Support Hosted Solution Environment Ink Customer Relationship Management IP Address

Newsletter Sign Up