(403) 210-2927    Get SUPPORT

OnSite I.T. Blog

Improperly Disposing of a Hard Drive Can Threaten Your Security

Improperly Disposing of a Hard Drive Can Threaten Your Security

No technology lasts forever. Your business will need to replace server hardware or workstations eventually, no matter how well you take care of it. However, what do you do with the hard drive of any device that you have to replace? If you don’t take action to destroy your old hard drive (after moving any data off of it as needed), you could be in violation of various compliance guidelines issued by HIPAA.

Why is HIPAA Important?
The Health Insurance Portability and Accountability Act of 1996 accomplishes two major goals: protect the health insurance coverage of workers as they change their employment, and protect the privacy of health data. One of the best ways to protect data like this is to make sure that only a certain number of copies are available, and that none of them are sitting around and waiting for someone to steal them. Even if it’s just sitting around waiting to be recovered, the data is at risk.

The latter point is particularly important since medical professionals need to store each individual patient’s data on their systems. Doctors aren’t immune to the dangers of hardware failure, and if they carelessly chuck their old hard drives following a catastrophic failure of some sort, there could be serious consequences. HIPAA provides specific requirements that healthcare providers need to adhere to in order to avoid liability for any issues related to data privacy.

How Do You Destroy Your Data?
One oddity with HIPAA compliance is that it doesn’t provide organizations or healthcare providers with any specific way to destroy data. However, it does provide some suggestions. You can magnetize your hard drive to delete data, or you could just smash it into a billion little pieces. One other common way of destroying data on a hard drive is by taking a power drill to it, but any physical destruction of the drive will work sufficiently. In order to completely destroy your data, however, you’ll want to take a few more steps. One of the best ways to make sure that your organization is prepared to face HIPAA compliance is by working with a managed service provider. Instead of destroying the drive yourself, you can leave it up to the professionals to use specialized equipment to destroy the drive, eliminating any risk on your end.

Does your organization need assistance with keeping compliance issues at the top of mind? OnSite I.T. can help your organization ensure data compliance with your specific industry’s standards. To learn more, reach out to us at (403) 210-2927.

ALERT: Meltdown/Spectre Vulnerability Can Affect Y...
Tip of the Week: How ‘StarWars’ Can Compromise You...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, October 23 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Network Security Tech Term Privacy Smartphones Internet Cybersecurity Browser Cloud Malware Communication Productivity Efficiency User Tips Hardware Microsoft Passwords Android Ransomware Google Saving Money Hosted Solutions Communications Wi-Fi Email Data Small Business Managed IT services Marketing Employer-Employee Relationship Blockchain IT Support Users Innovation Mobile Device Backup Social Media Business Workplace Tips Internet of Things Business Intelligence Mobile Devices VoIP Business Management Collaboration Applications Software Network Windows 10 VPN BDR Hackers Data Breach Patch Management Cloud Computing Excel Information Virtualization Gmail Cost Management Router Save Money Data recovery Miscellaneous Remote Computing Data Management Outsourced IT Computers Analytics Government Managed IT Service Wireless Charging Automation Networking Wireless Tech Terms Cortana Managed IT Services Compliance Data Backup Artificial Intelligence Computer Data Protection Virtual Assistant Bandwidth Smartphone IT Services Phishing Ink Reporting Content Filtering Laptop SSD G Suite File Sharing Holiday Edge Microsoft Office Unified Communications Authentication Troubleshooting Settings Gadgets Maintenance Remote Monitoring and Management Spyware Downloads Error IT Management Sales PowerPoint Medical IT Facebook Big Data Bring Your Own Device eCommerce WannaCry Telecommute Hard Drives Comparison Office 365 RAM Authorization Chrome Update Battery Server Management Internet Explorer Analysis HP Websites Trends How To Database Amazon Tablet Sports SaaS Server Twitter Environment Hybrid Cloud User Security HIPAA Data loss Managed Service Specifications Technology Tips Microsoft Teams Outlook Threat Document Management A.I. Touchscreen Apple Telecommuting Spam Cybercrime Knowledge GDPR IT budget Inventory e-waste Cables Hard Drive Virus Printing Conferencing Company Culture Law Enforcement Telephony Lead Generation Paperless Office Dongle Movies Microsoft Office 365 iPhone Workers Online Shopping Network Attached Storage Tactics Plug-In Antivirus Connectivity Storage Tip of the week Mobile Security disposal Voice over Internet Protocol Business Technology Processors Paper Office Physical Security Backup and Disaster Recovery Managing Stress Voice over IP Machine Learning Digital Access Control Millennials Password Proactive IT Vulnerability Staff Apps Safety Streaming Media Dark Web User Tip Operating System Value Hacker The Internet of Things Productivity Budget Remote Monitoring Competition Customer Relationship Management IP Address Website Customer Service Search Mobile Office Upgrade Domains Quick Tips Mobile Device Management Windows 10 Public Speaking Presentation Disaster Recovery Two-factor Authentication Managed Service Provider Lithium-ion battery Regulation Hiring/Firing Augmented Reality Wireless Technology 5G Printers Tech Support Alert IBM Fun