Proper Hard Drive Disposal Is An Involved Process

Proper Hard Drive Disposal Is An Involved Process

When a business utilizes any kind of technology, there will come a time when that technology needs to be replaced--which means that the business will need to be sure that any data on the old machines cannot be recovered. This, in turn, means that the machine’s hard drive must be destroyed. In order to be absolutely certain that this has been accomplished, it helps to lean on the guidelines established by HIPAA.

Why HIPAA is Important
HIPAA, or the Health Insurance Portability and Accountability Act of 1996, was intended to do two things: first, protect the health insurance coverage of workers as they change their employment, and secondly (and more relevant to this topic) to protect the availability and privacy of health data. Part of preserving the privacy of this health data is ensuring that there aren’t extra copies of it lying around, waiting to be recovered.

This is a particularly crucial point, as medical professionals maintain a considerable amount of their patients’ data on their systems. Should they simply throw out an old computer without dealing with the hard drive (or upgrade to a new drive without doing the same) they open themselves up to serious consequences and liabilities. For this reason, HIPAA includes requirements that these providers must follow to prevent this from happening.

Destroying Data
Somewhat surprisingly, HIPAA doesn’t specifically outline any procedures for acceptable data destruction, although it does offer suggested methods. These range from magnetizing (or degaussing) the drive-in question to eliminate the data, to simply smashing it. Other common methods of destroying a disk drive involve running a drill through it.

However, to truly ensure your data security, you’ll want to take it a few steps further.

In order to really ensure your compliance to the standards outlined in HIPAA, it is best to lean on the resources of a professional. Rather than relying on blunt force trauma to destroy an unwanted drive, a pro can literally shred the drive with specialized equipment.

Celera Networks can handle the disposal of your equipment on your behalf, allowing you to focus on putting your new solutions to work for your benefit. For more information, reach out to us at (617) 375-9100.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 18 March 2018

Captcha Image

Request a Free Consultation

  • Company name *
  • First Name *
  • Last Name *
  • Title
  • Phone
  • What are your concerns?

      Sign up for our Newsletter!

      • Company *
      • First Name *
      • Last Name *

          Mobile? Grab this Article!

          QR-Code dieser Seite

          Tag Cloud

          security Tip of the Week technology Privacy Best Practices Cloud Hackers Business Computing Productivity business Malware Microsoft Internet IT Services Backup IT Support Hosted Solutions Managed Service Provider Email Network Mobile Devices Workplace Tips Communication Hardware Smartphones Disaster Recovery Computer Mobile Device Management Microsoft Office Holiday Windows Miscellaneous network security Efficiency Software Data Windows 10 Business Continuity Small Business Smartphone Server Google Alert Virtualization Internet of Things Upgrade Saving Money Business Management User Tips Remote Monitoring Innovation Ransomware Social Media WiFi VoIP Passwords Remote Computing Operating System Big Data Android Gmail Cybersecurity BYOD App Mobile Computing The Internet of Things Office Browser Apps Apple Spam Vendor Management Wireless Technology Facebook Collaboration Information Technology Budget Artificial Intelligence Business Growth Risk Management Hacking Phishing Analytics Bring Your Own Device Office 365 IT Solutions Managed IT Services Cybercrime Customer Service Automation Save Money Hacker Going Green Robot Money Cost Management Outsourced IT Office Tips Gadgets Data Management Retail Best Practice Tech Support Mobile Device Hosted Solution Maintenance Social Engineering IT service Bitcoin Laptop communications Two-factor Authentication Data storage VPN IT Consultant Recovery Health Saving Time Hard Drives Cortana Outlook Employer-Employee Relationship Application Presentation Content Filtering Firewall Document Management Downtime Computers Lithium-ion Battery Running Cable End of Support Antivirus Customer Relationship Management virus Website Proactive IT Current Events intranet Avoiding Downtime Managed IT Websites Specifications Data Security Disaster Productivity User Mobile Technology Google Docs project management Augmented Reality Phone System Piracy Hacks Marketing Chrome USB Data Breach Work/Life Balance Data Recovery Social PowerPoint Samsung Statistics LiFi Update Law Enforcement Windows 8 Password Save Time IT Support Private Cloud Excel Tablet Hiring/Firing Quick Tips Blockchain Safety Vulnerabilities Mouse Company Culture Business Owner Encryption Competition Twitter iPhone eWaste Wireless Search Settings Humor Trending Bandwidth Education Cloud Computing Net Neutrality Virtual Desktop Analyitcs Network Congestion Administration Programming Cryptocurrency Google Drive Video Surveillance Halloween Computer Repair Heating/Cooling Windows Server 2008 Access Control Help Desk IBM Crowdsourcing Software License Licensing Router Botnet Scary Stories today ’s world Multi-factor Authentication Windows 7 Hard Drive Disposal Managed Service Providers Virtual Reality Government Redundancy Mobile Payment Touchscreen Sports experience downtime Device security Freedom of Information Unified Threat Management Unified Communications Fun Compliance Patch Management Printing Storage Tech Term Documents News Fiber-Optic Digital Signature Downloads Travel Regulations IT Plan Entrepreneur Comparison Computing Dark Data Crowdfunding Buisness Paperless Office HTML Refrigeration PDF Fake News Fraud data breaches Deep Learning IP Address Google Wallet Gadget Knowledge Migration Television Managed IT Services CIO Data Protection Co-managed IT Microsoft Excel Mobile Office email scam risk Online Currency Drones Politics Experience Business Technology Cyber-attacks Public Cloud User Error cyberattack Identities Black Market Telephony Desktop SharePoint Identity Theft Windows 8.1 Update security breach Undo Printer Tip of the week Computing Infrastructure cyberattacks Debate Solid State Drive Backups Skype Training Applications Word Consumers Distributed Denial of Service Digital Data loss Memory YouTube Modern technology Printer Server Processors Display Vulnerability businesses Alt Codes Mobility Legal LinkedIn File Sharing Mobile Security Users Evernote Virtual Assistant IT Management business owners Domains Environment Notifications Wi-Fi Monitors Networking Software as a Service Typing Best Available Files bdr Flexibility Data Warehousing Hard Drive History Google Calendar People Public Speaking Troubleshooting Telephone Systems 5G Writing Business Cards Business Intelligence Technology Tips Cabling IT Budget UTM CCTV Infrastructure Digital Payment G Suite Point of Sale Uninterrupted Power Supply Google Maps Machine Learning Unified Threat Management SaaS Meetings Hard Disk Drive Software Tips Relocation Physical Security Webcam Motion Sickness Chromebook How To GPS Error Personal Information Cleaning Emoji Upgrades Tracking Corporate Profile Electronic Medical Records Devices Computer Care 3D Printing WannaCry Automobile test post Staffing Unsupported Software Administrator Taxes Data Backup Mobile Data Sync Web Server Supercomputer Value Mobile Device Managment Cameras