(403) 210-2927    Get SUPPORT

OnSite I.T. Blog

OnSite I.T. has been serving the Alberta area since , providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Improperly Disposing of a Hard Drive Can Threaten Your Security

Improperly Disposing of a Hard Drive Can Threaten Your Security

No technology lasts forever. Your business will need to replace server hardware or workstations eventually, no matter how well you take care of it. However, what do you do with the hard drive of any device that you have to replace? If you don’t take action to destroy your old hard drive (after moving any data off of it as needed), you could be in violation of various compliance guidelines issued by HIPAA.

Why is HIPAA Important?
The Health Insurance Portability and Accountability Act of 1996 accomplishes two major goals: protect the health insurance coverage of workers as they change their employment, and protect the privacy of health data. One of the best ways to protect data like this is to make sure that only a certain number of copies are available, and that none of them are sitting around and waiting for someone to steal them. Even if it’s just sitting around waiting to be recovered, the data is at risk.

The latter point is particularly important since medical professionals need to store each individual patient’s data on their systems. Doctors aren’t immune to the dangers of hardware failure, and if they carelessly chuck their old hard drives following a catastrophic failure of some sort, there could be serious consequences. HIPAA provides specific requirements that healthcare providers need to adhere to in order to avoid liability for any issues related to data privacy.

How Do You Destroy Your Data?
One oddity with HIPAA compliance is that it doesn’t provide organizations or healthcare providers with any specific way to destroy data. However, it does provide some suggestions. You can magnetize your hard drive to delete data, or you could just smash it into a billion little pieces. One other common way of destroying data on a hard drive is by taking a power drill to it, but any physical destruction of the drive will work sufficiently. In order to completely destroy your data, however, you’ll want to take a few more steps. One of the best ways to make sure that your organization is prepared to face HIPAA compliance is by working with a managed service provider. Instead of destroying the drive yourself, you can leave it up to the professionals to use specialized equipment to destroy the drive, eliminating any risk on your end.

Does your organization need assistance with keeping compliance issues at the top of mind? OnSite I.T. can help your organization ensure data compliance with your specific industry’s standards. To learn more, reach out to us at (403) 210-2927.

ALERT: Meltdown/Spectre Vulnerability Can Affect Y...
Tip of the Week: How ‘StarWars’ Can Compromise You...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, July 20 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Best Practices Network Security Business Computing Privacy Technology Tech Term Cybersecurity Hardware Smartphones Communications Android Internet Wi-Fi Malware Ransomware Mobile Devices Email Data Small Business Employer-Employee Relationship IT Support Cloud Microsoft Passwords Business Management Managed IT services Applications Backup Router Tech Terms Business Intelligence Remote Computing Collaboration Network Browser Blockchain Innovation Smartphone Windows 10 Google Social Media Computers Productivity Business Data Breach Wireless Charging Wireless Gmail VoIP Networking Artificial Intelligence Internet of Things Outsourced IT Computer Communication Government Cortana Managed IT Service Virtual Assistant Software VPN IT Services Data Protection Phishing Save Money Cost Management Saving Money Data Management Excel Patch Management Hybrid Cloud Analytics Environment Hard Drives Spam Threat How To eCommerce Hard Drive Technology Tips Comparison A.I. Cables e-waste Hosted Solutions User Security Network Attached Storage Printing Apple Online Shopping Virus Processors Data Backup Specifications Movies Voice over Internet Protocol Physical Security disposal Telecommuting Safety Apps Password Paper iPhone Antivirus Vulnerability Backup and Disaster Recovery Conferencing Laptop Value Workers Business Technology Efficiency Ink Settings Staff Spyware SSD Office Big Data Unified Communications Users Information Millennials Miscellaneous User Tips Server Management PowerPoint Battery Cloud Computing RAM HP Facebook Content Filtering Amazon Database Virtualization Websites Sales Automation Sports Microsoft Teams Document Management Twitter Chrome Workplace Tips IT budget Cybercrime Server Lead Generation Tablet Company Culture Paperless Office Inventory Plug-In Tactics Dongle Knowledge Machine Learning Connectivity Managing Stress Digital Mobile Security Managed IT Services Law Enforcement Marketing Telephony Bandwidth Hackers Streaming Media G Suite Edge Operating System Tip of the week IT Management Maintenance Voice over IP WannaCry BDR Office 365 Telecommute Downloads Bring Your Own Device User Tip File Sharing Internet Explorer Holiday HIPAA Data recovery Data loss Trends Mobile Device Management Public Speaking Two-factor Authentication Lithium-ion battery Augmented Reality Tech Support Productivity The Internet of Things Gadgets Hiring/Firing Budget Competition Fun Upgrade Search Windows 10 Presentation 5G Wireless Technology Managed Service Provider IBM Hacker Proactive IT Alert Microsoft Office Customer Relationship Management IP Address Remote Monitoring and Management Website Remote Monitoring Customer Service Mobile Office Domains