Computerware

Proper Hard Drive Disposal is An Involved Process

Proper Hard Drive Disposal is An Involved Process

When a business utilizes any kind of technology, there will come a time when that technology needs to be replaced--which means that the business will need to be sure that any data on the old machines cannot be recovered. This, in turn, means that the machine’s hard drive must be destroyed. In order to be absolutely certain that this has been accomplished, it helps to lean on the guidelines established by HIPAA.

Why HIPAA is Important
HIPAA, or the Health Insurance Portability and Accountability Act of 1996, was intended to do two things: first, protect the health insurance coverage of workers as they change their employment, and secondly (and more relevant to this topic) to protect the availability and privacy of health data. Part of preserving the privacy of this health data is ensuring that there aren’t extra copies of it lying around, waiting to be recovered.

This is a particularly crucial point, as medical professionals maintain a considerable amount of their patients’ data on their systems. Should they simply throw out an old computer without dealing with the hard drive (or upgrade to a new drive without doing the same) they open themselves up to serious consequences and liabilities. For this reason, HIPAA includes requirements that these providers must follow to prevent this from happening.

Destroying Data
Somewhat surprisingly, HIPAA doesn’t specifically outline any procedures for acceptable data destruction, although it does offer suggested methods. These range from magnetizing (or degaussing) the drive-in question to eliminate the data, to simply smashing it. Other common methods of destroying a disk drive involve running a drill through it.

However, to truly ensure your data security, you’ll want to take it a few steps further.

In order to really ensure your compliance to the standards outlined in HIPAA, it is best to lean on the resources of a professional. Rather than relying on blunt force trauma to destroy an unwanted drive, a pro can literally shred the drive with specialized equipment.

Computerware can handle the disposal of your equipment on your behalf, allowing you to focus on putting your new solutions to work for your benefit. For more information, reach out to us at (703) 821-8200.

Scam Leverages Email from a Reluctant Contract Kil...
Tip of the Week: Why You Should Reconsider Your Be...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, July 17, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Software Microsoft Business Computing Hackers Managed Service Provider Backup Productivity Workplace Tips Data Hardware Business Saving Money Malware Email IT Services IT Support Hosted Solutions Network Security Google Small Business Efficiency Smartphones Gadgets Quick Tips Business Continuity Mobile Devices User Tips Computer Disaster Recovery Mobile Office Virtualization Network Android Innovation Microsoft Office Mobile Device Management Server VoIP Social Media Smartphone Miscellaneous Upgrade Windows 10 Unified Threat Management Windows Ransomware Remote Monitoring Operating System Passwords Collaboration Communication Holiday Mobile Computing BYOD Remote Computing Apps Cybersecurity Managed IT services WiFi Vendor Management Data Backup Marketing Facebook IT Support Data Recovery The Internet of Things Apple Firewall Analytics Users History Automation Internet of Things Alert Tech Term Data Management communications BDR Productivity Outsourced IT App Save Money Artificial Intelligence Managed IT Services Phishing IT Consultant Gmail Bandwidth Content Filtering Going Green Office Mobile Device Bring Your Own Device Big data Health Spam Hard Drives Lithium-ion Battery Outlook Best Practice Information Technology Windows 8 Browser Managed IT Cybercrime Encryption Maintenance Printer Virus Tech Support Cost Management Wireless Technology Antivirus Search Budget Hiring/Firing Computers Recovery Travel IBM Employer-Employee Relationship Update Help Desk Hacking Office 365 Phone System Money Document Management Customer Service Two-factor Authentication Proactive IT Windows 10 Running Cable Training Law Enforcement Saving Time Website Government VPN Compliance Intranet Data storage Hard Drive Education Humor Risk Management Cloud Computing Networking It Management Legal Administration Business Technology Regulations Save Time SaaS End of Support Data Breach Hosted Solution Company Culture Robot iPhone Telephone Systems Computer Repair Wireless Social Networking DDoS Securty Project Management Excel Fax Server Solid State Drive Twitter Flexibility Customer Relationship Management Black Market Word Access Control Augmented Reality Password Cortana Mobility Laptop PowerPoint Social Engineering Business Growth Data Security Hacker Business Intelligence Applications Digital Payment Patch Management Blockchain Data Loss Downtime Paperless Office User Comparison Tablet Avoiding Downtime Disaster Current Events Machine Learning Trending User Error Taxes Co-managed IT Social Distributed Denial of Service Documents Mouse Heating/Cooling Digital Pain Points IT service Public Cloud Statistics Storage Programming Websites Start Menu Tech Terms Lifestyle Network Congestion Identity Theft Bluetooth Mobile Technology Retail Vulnerabilities Software as a Service Google Maps Uninterrupted Power Supply Healthcare Streaming Media Cryptocurrency eWaste Value Virtual Reality Gaming Console Politics Google Docs Automobile Emails Experience Bitcoin Net Neutrality Data Protection Webcam Monitors Chromebook Cleaning Text Messaging Computing Infrastructure Hack Processors Chrome Office Tips How To USB Private Cloud YouTube Presentation Download Router Scam Unified Communications Settings Computer Accessories Sports Virtual Desktop Computing Specifications Safety Telephony Redundancy Inbound Marketing Worker LinkedIn VoIP Leadership Fraud Tactics Microchip Touchscreen Adminstration News Pirating Information Devices Knowledge Digital Signature Monitoring Permissions Consultation Language Evernote Webinar UTM Content Reading Samsung Teamwork Legislation G Suite Skype Technology Tips Entertainment IT Plan Enterprise Resource Planning Employer Employee Relationship Archive Virtual Assistant Licensing switches Writing Audit email scam Addiction Hacks Physical Security Music Fake News Accountants Relocation Tablets Upgrades Management Banking Botnet Point of Contact Data Warehousing PDF Multi-factor Authentication Information Best Available Keyboard Wireless Headphones Sync LiFi Access Upselling Migration Connected Devices File Sharing Emergency Hard Drive Disposal Computer Care Best Practives Domains Network Management Notifications CCTV Microsoft Excel Video Surveillance Equifax Reliable Computing Recycling Deep Learning Saving ZTime Public Speaking Business Metrics Computer Malfunction Analytic Google Drive Work/Life Balance Windows Server 2008 Device security Microserver Shortcut Nanotechnology In Internet of Things Visible Light Communication Product Reviews Spyware Memory Mobile Payment Desktop Finance Vulnerability Startup IT consulting Electricity Harddrive Printing Troubleshooting Business Cards Service Level Agreement Read Debate Entrepreneur Scalability Get More Done HIPAA Unified Threat Management Backup and Disaster Recovery Motion Sickness GPS Windows 7 Environment Turn Key Competition Screen Reader Advertising cache Flash Television Printer Server Electronic Payment Gamification Messenger Device Management Tracking CIO External Harddrive Smart Tech Windows XP Business Managemenet WannaCry Downloads Trojan Business Owner Piracy Upload Rental Service Meetings Staffing Content Management Google Wallet Cabling Corporate Profile Displays Thin CLient IP Address Fiber-Optic Database Web Server Society Time Management 3D Freedom of Information Ebay Organize HTML Application Conferencing Wi-Fi Administrator Assessment SharePoint Human Resources Mobile Security Books Workers online Currency Smart Phones Micrsooft Multi-Factor Security Google Calendar Software License Trends Supercomputer Drones Tip of the week Capital Productuvuty MSP 3D Printing Username Managing Stress CrashOverride

toner1.7