Contact us today!  (512) 494-6978

Austin Technology Group Blog

Austin Technology Group has been serving Texas since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Improperly Disposing of a Hard Drive Can Threaten Your Security

Improperly Disposing of a Hard Drive Can Threaten Your Security

No technology lasts forever. Your business will need to replace server hardware or workstations eventually, no matter how well you take care of it. However, what do you do with the hard drive of any device that you have to replace? If you don’t take action to destroy your old hard drive (after moving any data off of it as needed), you could be in violation of various compliance guidelines issued by HIPAA.

Why is HIPAA Important?
The Health Insurance Portability and Accountability Act of 1996 accomplishes two major goals: protect the health insurance coverage of workers as they change their employment, and protect the privacy of health data. One of the best ways to protect data like this is to make sure that only a certain number of copies are available, and that none of them are sitting around and waiting for someone to steal them. Even if it’s just sitting around waiting to be recovered, the data is at risk.

The latter point is particularly important since medical professionals need to store each individual patient’s data on their systems. Doctors aren’t immune to the dangers of hardware failure, and if they carelessly chuck their old hard drives following a catastrophic failure of some sort, there could be serious consequences. HIPAA provides specific requirements that healthcare providers need to adhere to in order to avoid liability for any issues related to data privacy.

How Do You Destroy Your Data?
One oddity with HIPAA compliance is that it doesn’t provide organizations or healthcare providers with any specific way to destroy data. However, it does provide some suggestions. You can magnetize your hard drive to delete data, or you could just smash it into a billion little pieces. One other common way of destroying data on a hard drive is by taking a power drill to it, but any physical destruction of the drive will work sufficiently. In order to completely destroy your data, however, you’ll want to take a few more steps. One of the best ways to make sure that your organization is prepared to face HIPAA compliance is by working with a managed service provider. Instead of destroying the drive yourself, you can leave it up to the professionals to use specialized equipment to destroy the drive, eliminating any risk on your end.

Does your organization need assistance with keeping compliance issues at the top of mind? Austin Technology Group can help your organization ensure data compliance with your specific industry’s standards. To learn more, reach out to us at (512) 494-6978.

ALERT: Meltdown/Spectre Vulnerability Can Affect Y...
Tip of the Week: How ‘StarWars’ Can Compromise You...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 17 January 2018

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

Telephony Government Miscellaneous Data Backup WiFi Business Computing User Security Wireless Save Money Shortcut Paste Online Shopping Remote Monitoring Google Data Breach Multi-Factor Security eCommerce Best Practices Email Biometrics Wi-Fi WannaCry Files Licensing Hardware Bandwidth Phone System VoIp Copy Apps Live Streaming Technology Managed IT Service Content Filtering Alert Excel Entertainment Holiday Managed IT Services Cybercrime Thank You Disaster Recovery IT Support Android File Sharing HIPAA HP Printers Retail Smartphones Chrome Gadgets Managed IT Services User Tips Maintenance Lead Generation Mobile Device Management Conferencing Information Technology Microsoft Office Google Drive Email Management Data Management Virtualization Automobile Malware Phishing CrashOverride Two-factor Authentication WIndows 10 Botnet Tip of the week Cybersecurity Vulnerability Remote Control Browser Law Enforcement Hackers Gmail Budget Printer Saving Money Hosted Solutions Data Recovery The Internet of Things Spyware Small Business VoIP Internet Telecommuting Hard Drive Communication Word Tip of the Week Business Continuity Employer-Employee Relationship Knowledge Data Protection Innovation Spam Patch Management Tablet Smart Technology WhatsApp Dark Web Telephone System Remote Computing Worker Productivity Net Neutrality Network Security Router Hosted Solution Voice over IP Virtual Assistant Security Cloud Computing Wireless Charging Software Twitter Applications Politics Backup Collaboration User Tip Comparison Ransomware Remote Support Staffing Settings Cloud Marketing Automation Office 365 How To Spam Blocking Physical Security Scam Processors Printer Server Cleaning Managed IT Millennials Microsoft Google Maps Hiring/Firing Gadget Analytics Internet of Things Business Intelligence IT Support App Windows Windows 10 Telephone Systems Office Tech Support Emergency News Business Management Battery Credit Cards Privacy Business Technology Specifications Communications Access Password Facebook Sales Outsourced IT Recovery Company Culture Smartphone Workers Apple Travel Computer Cortana Efficiency Education Social Media Current Events Business Congratulations Virus Access Control iPhone BYOD Passwords Website IT Services Server