Out of the Box Solutions Blog

Out of the Box Solutions has been serving the Michigan area since 2002, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses

Improperly Disposing of a Hard Drive Can Threaten Your Security

Improperly Disposing of a Hard Drive Can Threaten Your Security

No technology lasts forever. Your business will need to replace server hardware or workstations eventually, no matter how well you take care of it. However, what do you do with the hard drive of any device that you have to replace? If you don’t take action to destroy your old hard drive (after moving any data off of it as needed), you could be in violation of various compliance guidelines issued by HIPAA.

Why is HIPAA Important?
The Health Insurance Portability and Accountability Act of 1996 accomplishes two major goals: protect the health insurance coverage of workers as they change their employment, and protect the privacy of health data. One of the best ways to protect data like this is to make sure that only a certain number of copies are available, and that none of them are sitting around and waiting for someone to steal them. Even if it’s just sitting around waiting to be recovered, the data is at risk.

The latter point is particularly important since medical professionals need to store each individual patient’s data on their systems. Doctors aren’t immune to the dangers of hardware failure, and if they carelessly chuck their old hard drives following a catastrophic failure of some sort, there could be serious consequences. HIPAA provides specific requirements that healthcare providers need to adhere to in order to avoid liability for any issues related to data privacy.

How Do You Destroy Your Data?
One oddity with HIPAA compliance is that it doesn’t provide organizations or healthcare providers with any specific way to destroy data. However, it does provide some suggestions. You can magnetize your hard drive to delete data, or you could just smash it into a billion little pieces. One other common way of destroying data on a hard drive is by taking a power drill to it, but any physical destruction of the drive will work sufficiently. In order to completely destroy your data, however, you’ll want to take a few more steps. One of the best ways to make sure that your organization is prepared to face HIPAA compliance is by working with a managed service provider. Instead of destroying the drive yourself, you can leave it up to the professionals to use specialized equipment to destroy the drive, eliminating any risk on your end.

Does your organization need assistance with keeping compliance issues at the top of mind? Out of the Box Solutions can help your organization ensure data compliance with your specific industry’s standards. To learn more, reach out to us at 800-750-4OBS (4627).

ALERT: Meltdown/Spectre Vulnerability Can Affect Y...
Tip of the Week: How ‘StarWars’ Can Compromise You...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, July 18 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Business Computing Network Security Privacy Technology Cybersecurity Tech Term Hardware Communications Smartphones Internet Ransomware Android Small Business Wi-Fi Mobile Devices Applications Malware Microsoft IT Support Backup Data Business Management Managed IT services Employer-Employee Relationship Email Gmail VPN VoIp Data Management IT Services Business Networking Tech Terms Outsourced IT Patch Management Social Media Virtual Assistant Productivity Collaboration Innovation Cortana Passwords Blockchain Windows 10 Network Internet of Things Computers Cloud Wireless Communication Save Money Managed IT Service Remote Computing Saving Money Computer Cost Management Wireless Charging Artificial Intelligence Business Intelligence e-waste Server HP Safety Downloads Workers Big Data Threat Hard Drives G Suite Voice over IP User Tips disposal Trends Millennials Printing SSD Bring Your Own Device Holiday Document Management Users Value Lead Generation Telecommute Dongle A.I. Physical Security Business Technology Paper Facebook Hybrid Cloud eCommerce Network Attached Storage Managed IT Services Paperless Office Smartphone Bandwidth Movies Laptop Ink Twitter Cables Online Shopping Password Tip of the week Digital Database Data loss PowerPoint Government Phishing Inventory Voice over Internet Protocol Efficiency Comparison Spam User Tip Browser Cybercrime WannaCry Sports BDR Unified Communications Data Breach Software Data Protection Settings Server Management Specifications HIPAA Virus Edge Marketing Tactics Data recovery RAM Sales Mobile Security Information Hard Drive Antivirus Connectivity Hackers Microsoft Teams IT budget Tablet Conferencing Operating System Amazon Battery Automation Processors Staff Maintenance Apps Technology Tips Company Culture Excel Office Workplace Tips Vulnerability Cloud Computing Telecommuting Analytics Router Data Backup Managing Stress Office 365 Knowledge Content Filtering Environment Virtualization Machine Learning Spyware Websites Streaming Media Internet Explorer Backup and Disaster Recovery Google Telephony IT Management Proactive IT Gadgets Remote Monitoring and Management Alert Plug-In