facebook linkedin twitter

Proper Hard Drive Disposal is An Involved Process

Proper Hard Drive Disposal is An Involved Process

When a business utilizes any kind of technology, there will come a time when that technology needs to be replaced--which means that the business will need to be sure that any data on the old machines cannot be recovered. This, in turn, means that the machine’s hard drive must be destroyed. In order to be absolutely certain that this has been accomplished, it helps to lean on the guidelines established by HIPAA.

Why HIPAA is Important
HIPAA, or the Health Insurance Portability and Accountability Act of 1996, was intended to do two things: first, protect the health insurance coverage of workers as they change their employment, and secondly (and more relevant to this topic) to protect the availability and privacy of health data. Part of preserving the privacy of this health data is ensuring that there aren’t extra copies of it lying around, waiting to be recovered.

This is a particularly crucial point, as medical professionals maintain a considerable amount of their patients’ data on their systems. Should they simply throw out an old computer without dealing with the hard drive (or upgrade to a new drive without doing the same) they open themselves up to serious consequences and liabilities. For this reason, HIPAA includes requirements that these providers must follow to prevent this from happening.

Destroying Data
Somewhat surprisingly, HIPAA doesn’t specifically outline any procedures for acceptable data destruction, although it does offer suggested methods. These range from magnetizing (or degaussing) the drive-in question to eliminate the data, to simply smashing it. Other common methods of destroying a disk drive involve running a drill through it.

However, to truly ensure your data security, you’ll want to take it a few steps further.

In order to really ensure your compliance to the standards outlined in HIPAA, it is best to lean on the resources of a professional. Rather than relying on blunt force trauma to destroy an unwanted drive, a pro can literally shred the drive with specialized equipment.

Computerware can handle the disposal of your equipment on your behalf, allowing you to focus on putting your new solutions to work for your benefit. For more information, reach out to us at (703) 821-8200.

Scam Leverages Email from a Reluctant Contract Kil...
Tip of the Week: Why You Should Reconsider Your Be...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, October 23, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Business Computing Software Hackers Microsoft Backup Managed Service Provider Workplace Tips Productivity Data Hardware Saving Money Business Email Malware Network Security IT Services IT Support Hosted Solutions Efficiency Google Small Business Computer Smartphones User Tips Gadgets Quick Tips Mobile Devices Business Continuity Disaster Recovery Innovation Virtualization Network Microsoft Office Android Mobile Office Social Media Server VoIP Mobile Device Management Collaboration Communication Miscellaneous Smartphone Ransomware Upgrade Windows 10 Data Backup Unified Threat Management Windows Data Recovery Operating System Tech Term IT Support Passwords Remote Monitoring BYOD Productivity Remote Computing Vendor Management Holiday Mobile Computing Managed IT services Facebook communications WiFi Cybersecurity Apps Marketing BDR The Internet of Things Analytics History Users Apple Automation Firewall Data Management Phishing Outsourced IT Alert Internet of Things Mobile Device Managed IT Services Browser Save Money App IT Consultant Artificial Intelligence Big data Encryption Antivirus Spam Maintenance Content Filtering Health Going Green Office Bandwidth Gmail Bring Your Own Device Cybercrime Search Hiring/Firing Printer Hard Drives Virus Cost Management Tech Support Lithium-ion Battery Best Practice Information Technology Office 365 Budget Two-factor Authentication Managed IT Help Desk Outlook Windows 8 Wireless Technology Recovery Employer-Employee Relationship Money Document Management Hacking Computers Training Saving Time VPN Travel IBM Phone System Business Technology Update Cloud Computing Administration Save Time Windows 10 Networking Humor Legal Running Cable Proactive IT Regulations Access Control SaaS Intranet Education It Management Hard Drive Law Enforcement Customer Service Compliance Risk Management Data storage Government Website Data Breach Digital Payment Fax Server Downtime Laptop Information Business Growth Word Project Management Comparison Tablet Password Cortana Avoiding Downtime Company Culture Machine Learning Computer Repair Paperless Office Telephone Systems Hacker iPhone Social Networking Sports Disaster Applications Computing Hosted Solution End of Support Excel Twitter Data Security Robot User File Sharing Customer Relationship Management Securty Current Events Augmented Reality Patch Management Blockchain Wireless Data Loss PowerPoint Mobility Solid State Drive DDoS Social Engineering Business Intelligence Black Market Flexibility Computing Infrastructure Hack Lifestyle Cryptocurrency How To Router Management Google Docs Private Cloud Experience Digital Download Computer Accessories Retail eWaste Vulnerabilities Monitors Websites Cleaning Start Menu Tech Terms Healthcare Office Tips Value Inbound Marketing Telephony Trending Mobile Technology Taxes Mouse Vendor Distributed Denial of Service YouTube Software as a Service Uninterrupted Power Supply Processors Pain Points Programming Statistics Unified Communications Settings Public Cloud Network Congestion USB Presentation Bitcoin Data Protection Identity Theft Managed Service Safety Streaming Media Conferencing Virtual Desktop IT service Specifications Social Co-managed IT Google Maps User Error Documents Gaming Console Virtual Reality Politics Entertainment Scam Automobile Monitoring Heating/Cooling Emails Net Neutrality Bluetooth Text Messaging Chromebook Chrome Storage Redundancy Webcam Electronic Medical Records PDF VoIP email scam Content Management Addiction Deep Learning Touchscreen External Harddrive News Messenger Tracking Accountants Business Managemenet A.I. Work/Life Balance Knowledge Best Available Keyboard Consultation Evernote Rental Service Meetings Multi-factor Authentication Visible Light Communication Memory Cabling Best Practives Wireless Headphones Telephone Dark Web Technology Tips 3D Ebay Web Server Migration online Currency Connected Devices IT consulting Domains Virtual Assistant Thin CLient Health IT Audit Wi-Fi Administrator Network Management Public Speaking Smart Phones Fake News Books Workers Equifax Fleet Tracking CIO Shortcut Data Warehousing Supercomputer Device security Microserver LinkedIn MSP Advertising Flash Worker Nanotechnology Social Network Staffing Google Wallet Bookmark Entrepreneur Access Adminstration Pirating Information Microchip Desktop Finance Windows XP Troubleshooting Emergency Hard Drive Disposal Leadership Environment Computer Care Business Cards Archive Service Level Agreement Displays HIPAA Microsoft Excel Reading Samsung Get More Done Startup Skype Asset Tracking Society Electronic Payment G Suite Unified Threat Management Printer Server Backup and Disaster Recovery Micrsooft Competition Google Drive Windows Server 2008 Employer Employee Relationship Turn Key Username Licensing Trojan Point of Contact Screen Reader Customer Resource management Drones Browsers Spyware Mobile Payment Hacks Physical Security Gamification Business Owner Vulnerability User Tip Electricity Printing Banking Botnet Piracy Organize Upload IP Address Relocation Tablets Smart Tech Distribution Human Resources Upselling Sync Fiber-Optic Database Application Windows 7 HTML Permissions Language Analytic Telephone System Data Analysis cache Television Video Surveillance Notifications CCTV Recycling Mobile Security Multi-Factor Security Product Reviews Cost Music WannaCry Downloads Business Metrics Computer Malfunction Software License Trends switches Writing Saving ZTime Reliable Computing Corporate Profile In Internet of Things Fraud Webinar Tactics Read Upgrades Digital Signature Time Management Freedom of Information Devices Harddrive Teamwork Assessment SharePoint Debate UTM Content LiFi Legislation Error Proxy Server Google Calendar GPS Motion Sickness Device Management IT Plan Enterprise Resource Planning Tip of the week Scalability 3D Printing Capital Productuvuty Managing Stress Printers Regulation Fileless Malware CrashOverride

toner1