888.678.7282    Get SUPPORT

Strata Information Technology Blog

Improperly Disposing of a Hard Drive Can Threaten Your Security

Improperly Disposing of a Hard Drive Can Threaten Your Security

No technology lasts forever. Your business will need to replace server hardware or workstations eventually, no matter how well you take care of it. However, what do you do with the hard drive of any device that you have to replace? If you don’t take action to destroy your old hard drive (after moving any data off of it as needed), you could be in violation of various compliance guidelines issued by HIPAA.

Why is HIPAA Important?
The Health Insurance Portability and Accountability Act of 1996 accomplishes two major goals: protect the health insurance coverage of workers as they change their employment, and protect the privacy of health data. One of the best ways to protect data like this is to make sure that only a certain number of copies are available, and that none of them are sitting around and waiting for someone to steal them. Even if it’s just sitting around waiting to be recovered, the data is at risk.

The latter point is particularly important since medical professionals need to store each individual patient’s data on their systems. Doctors aren’t immune to the dangers of hardware failure, and if they carelessly chuck their old hard drives following a catastrophic failure of some sort, there could be serious consequences. HIPAA provides specific requirements that healthcare providers need to adhere to in order to avoid liability for any issues related to data privacy.

How Do You Destroy Your Data?
One oddity with HIPAA compliance is that it doesn’t provide organizations or healthcare providers with any specific way to destroy data. However, it does provide some suggestions. You can magnetize your hard drive to delete data, or you could just smash it into a billion little pieces. One other common way of destroying data on a hard drive is by taking a power drill to it, but any physical destruction of the drive will work sufficiently. In order to completely destroy your data, however, you’ll want to take a few more steps. One of the best ways to make sure that your organization is prepared to face HIPAA compliance is by working with a managed service provider. Instead of destroying the drive yourself, you can leave it up to the professionals to use specialized equipment to destroy the drive, eliminating any risk on your end.

Does your organization need assistance with keeping compliance issues at the top of mind? Strata Information Technology can help your organization ensure data compliance with your specific industry’s standards. To learn more, reach out to us at 888.678.7282.

ALERT: Meltdown/Spectre Vulnerability Can Affect Y...
Tip of the Week: How ‘StarWars’ Can Compromise You...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, September 18 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Business Computing Technology Managed IT Services Privacy Best Practices Cloud Malware Cybersecurity Hackers Communications Internet Tech Term Ransomware Backup VoIP Network Security Productivity Passwords Software Alert Smartphones Outsourced IT IT Support Business Management Social Media Save Money Microsoft Hosted Solutions Data Phishing Google Business Hardware Email Communication Small Business Data Recovery Cloud Computing Microsoft Office Smartphone Browser Data Breach Vulnerability IT Services User Tips Android Network App Data Backup Bandwidth Twitter Windows 10 Internet of Things Efficiency Computer Compliance Business Continuity BDR Apps Law Enforcement Productivity Blockchain Mobile Device Patch Management Workers Collaboration Office 365 Innovation Miscellaneous Settings Employer-Employee Relationship Remote Monitoring Scam Excel Saving Money Company Culture Cybercrime Politics Access Control Government Mobile Device Management Wi-Fi Windows Word Virtual Assistant Applications How To Entertainment Facebook Antivirus Recovery Maintenance Password Holiday Retail Office Website Computers Users Education Personal Information Vendor Management Automation Managed IT Service Chrome SaaS Spam Dark Web Networking Managing Stress Virus Inventory Information Mobile Devices Remote Monitoring and Management IT Management Sports Video Games Google Maps Emergency Telephony DDoS Worker Apple Edge Threat IaaS Two-factor Authentication Authorization Dongle News Dark Data Spyware Value Television Information Technology Storage Multi-Factor Security Specifications Avoiding Downtime Movies Credit Cards Amazon Smart Technology Email Management Tech Terms Connectivity Staffing Licensing Voice over IP Bring Your Own Device Printer iPhone HaaS Printer Server Tech Support Cortana Telephone System WannaCry Unified Threat Management HP Biometrics Error Data loss Gadget Safety Workplace Tips Business Intelligence The Internet of Things Regulation Sales Managed Service Provider Cost Management Streaming Media Marketing Travel Technology Tips Hybrid Cloud WiFi Managed IT Cleaning Printers Gadgets Budget Physical Security HIPAA Botnet VPN Document Management Database Leadership Access Touchscreen Router Content Filtering Hiring/Firing Employer Employee Relationship Staff RAM Current Events Shortcut Reporting Tablet Downloads Live Streaming Backup and Disaster Recovery Cables Plug-In Telephone Systems Data Protection Encryption Computer Care Files Battery Data Management Remote Support Hard Drive Paperless Office Tactics BYOD Microsoft Office 365 Gmail Automobile Websites Microsoft Teams Net Neutrality CrashOverride WhatsApp Wireless Charging Synergy e-waste Disaster Recovery Medical IT Knowledge Artificial Intelligence Trends SSD Voice over Internet Protocol Proactive IT Remote Control IT budget PowerPoint Gaming Console Yahoo Wireless Processors Digital Internet Explorer Analytics Authentication Lead Generation disposal GDPR Comparison Hard Drives A.I. Scalability Phone System Copy Public Speaking Spam Blocking User Security Search Scheduling Windows 10 Presentation Tip of the week Server G Suite Emoji Telecommute VoIP Lithium-ion battery Mobile Security Paste Augmented Reality Business Technology Instagram Wireless Technology 5G Money Laptop Printing Quick Tips Remote Computing Samsung IBM Conferencing Unified Communications Operating System Network Attached Storage Managed IT Services Hacker eCommerce Paper Telecommuting Competition Customer Relationship Management Online Shopping Environment Big Data Server Management IP Address Fun Ink Millennials Customer Service Upgrade Google Drive Mobile Office Hosted Solution Domains File Sharing IT Support Autocorrect User Tip Virtualization Machine Learning

Newsletter Sign Up