707-258-1492    Get SUPPORT

FormaTech IT Services Blog

FormaTech IT Services has been serving the Napa area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Improperly Disposing of a Hard Drive Can Threaten Your Security

Improperly Disposing of a Hard Drive Can Threaten Your Security

No technology lasts forever. Your business will need to replace server hardware or workstations eventually, no matter how well you take care of it. However, what do you do with the hard drive of any device that you have to replace? If you don’t take action to destroy your old hard drive (after moving any data off of it as needed), you could be in violation of various compliance guidelines issued by HIPAA.

Why is HIPAA Important?
The Health Insurance Portability and Accountability Act of 1996 accomplishes two major goals: protect the health insurance coverage of workers as they change their employment, and protect the privacy of health data. One of the best ways to protect data like this is to make sure that only a certain number of copies are available, and that none of them are sitting around and waiting for someone to steal them. Even if it’s just sitting around waiting to be recovered, the data is at risk.

The latter point is particularly important since medical professionals need to store each individual patient’s data on their systems. Doctors aren’t immune to the dangers of hardware failure, and if they carelessly chuck their old hard drives following a catastrophic failure of some sort, there could be serious consequences. HIPAA provides specific requirements that healthcare providers need to adhere to in order to avoid liability for any issues related to data privacy.

How Do You Destroy Your Data?
One oddity with HIPAA compliance is that it doesn’t provide organizations or healthcare providers with any specific way to destroy data. However, it does provide some suggestions. You can magnetize your hard drive to delete data, or you could just smash it into a billion little pieces. One other common way of destroying data on a hard drive is by taking a power drill to it, but any physical destruction of the drive will work sufficiently. In order to completely destroy your data, however, you’ll want to take a few more steps. One of the best ways to make sure that your organization is prepared to face HIPAA compliance is by working with a managed service provider. Instead of destroying the drive yourself, you can leave it up to the professionals to use specialized equipment to destroy the drive, eliminating any risk on your end.

Does your organization need assistance with keeping compliance issues at the top of mind? FormaTech IT Services can help your organization ensure data compliance with your specific industry’s standards. To learn more, reach out to us at 707-258-1492.

ALERT: Meltdown/Spectre Vulnerability Can Affect Y...
Tip of the Week: How ‘StarWars’ Can Compromise You...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 24 March 2018

Captcha Image

Newsletter Sign Up

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Cybersecurity Privacy Best Practices Business Computing Managed IT Services Cloud Email Communications VoIP Backup Small Business Network Security Software Malware IT Services Hardware Save Money Outsourced IT Data Management Passwords Efficiency Business Intelligence Virus Remote Monitoring Saving Money Technology Cloud Computing Productivity Gadgets Patch Management Office VPN Remote Computing Employer-Employee Relationship IT Support Business Business Management Vulnerability Internet Computers Knowledge Microsoft Antivirus Physical Security Managed IT Service Communication Hard Drive IT budget Staff Telephony BYOD Hackers Processors IT Management Access Control Websites Voice over IP Telephone Systems Analytics Spyware Tech Terms Conferencing Data Backup Data Breach Telephone System HP Network Attached Storage Data Recovery Content Filtering Spam Mobile Device Management IT Support Smartphone Spam Blocking Printer Server Document Management Server Management Gmail Hosted Solutions Cybercrime Applications Email Management Printers Data Paperless Office Artificial Intelligence User Tip Licensing Password Alert Digital Machine Learning Tip of the week Business Technology Big Data Innovation User Tips Hosted Solution Remote Support Entertainment Automation Telecommute Telecommuting Virtualization Data loss Server Phishing Wi-Fi HIPAA Google Maps Computer Cortana CrashOverride Apple 5G Access Wireless Technology WhatsApp Google Drive Comparison Managed Service Provider Staffing IBM Hacker Marketing App Internet of Things Business Continuity iPhone Microsoft Office Specifications Managed IT Services Customer Relationship Management IP Address Files Smart Technology Recovery WiFi Office 365 Website News Multi-Factor Security Retail Customer Service Mobile Office Information Technology Networking Battery Holiday Workers Remote Control Smartphones Windows Domains Hard Drives Excel Productivity Dongle eCommerce Windows 10 Data Protection Mobile Devices Public Speaking Router Phone System Two-factor Authentication Lithium-ion battery Emergency Online Shopping Cleaning File Sharing Augmented Reality Settings VoIP Tech Support Safety Government Apps Wireless Charging Botnet User Security The Internet of Things Law Enforcement Hiring/Firing Gadget Budget Browser Politics Competition Scam Lead Generation Collaboration Fun Ransomware Edge Users Dark Web Twitter Miscellaneous Travel Virtual Assistant Sales Google Upgrade Laptop Social Media Word Shortcut Wireless Education WannaCry Copy Chrome Tablet Search Automobile Windows 10 Blockchain How To Millennials Bandwidth Biometrics Presentation Live Streaming Paste Android