Our Most Popular Managed Services

If you need help deciding what services are best for your business let us know.

Logo

 
 Popular Services
 (347) 830-7322

Logo

 

Tekie Geek Blogs

Tekie Geek has been serving the Staten Island, Brooklyn, Queens, Bronx, New York City, Long Island and New Jersey area since 2012, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Proper Hard Drive Disposal is An Involved Process

Proper Hard Drive Disposal is An Involved Process

When a business utilizes any kind of technology, there will come a time when that technology needs to be replaced--which means that the business will need to be sure that any data on the old machines cannot be recovered. This, in turn, means that the machine’s hard drive must be destroyed. In order to be absolutely certain that this has been accomplished, it helps to lean on the guidelines established by HIPAA.

Why HIPAA is Important
HIPAA, or the Health Insurance Portability and Accountability Act of 1996, was intended to do two things: first, protect the health insurance coverage of workers as they change their employment, and secondly (and more relevant to this topic) to protect the availability and privacy of health data. Part of preserving the privacy of this health data is ensuring that there aren’t extra copies of it lying around, waiting to be recovered.

This is a particularly crucial point, as medical professionals maintain a considerable amount of their patients’ data on their systems. Should they simply throw out an old computer without dealing with the hard drive (or upgrade to a new drive without doing the same) they open themselves up to serious consequences and liabilities. For this reason, HIPAA includes requirements that these providers must follow to prevent this from happening.

Destroying Data
Somewhat surprisingly, HIPAA doesn’t specifically outline any procedures for acceptable data destruction, although it does offer suggested methods. These range from magnetizing (or degaussing) the drive-in question to eliminate the data, to simply smashing it. Other common methods of destroying a disk drive involve running a drill through it.

However, to truly ensure your data security, you’ll want to take it a few steps further.

In order to really ensure your compliance to the standards outlined in HIPAA, it is best to lean on the resources of a professional. Rather than relying on blunt force trauma to destroy an unwanted drive, a pro can literally shred the drive with specialized equipment.

Tekie Geek can handle the disposal of your equipment on your behalf, allowing you to focus on putting your new solutions to work for your benefit. For more information, reach out to us at (347) 830-7322.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 25 February 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Google Wallet BDR Employer-Employee Relationship Cleaning Data Protection Laptop Hosted Solution Unified Threat Management Encryption Smartphone Network Security File Sharing IT consulting firms Worker Comparison Banking Lenovo Monitors Retail Hosted Solutions Telephone Systems data loss Mobile Technology Education it support Big Data malware worms Private Cloud Cybersecurity Mouse Cloud Computing Passwords VoIP Hacking Hacks Managed IT Services Virus Antivirus WiFi Tip of the Week Hacker How To tech support Staten Isalnd Motion Sickness Facebook Solid State Drive Productivity Server SaaS Law Enforcement Excel Computer Care Network Congestion User Tips Managed Service Provider Business Technology Microsoft Maintenance Cache Bandwidth Cloud Cryptocurrency DDoS Customer Service Hackers Bluetooth Processors Content Filtering Printing Business Downloads Apple Document Management Data Management Physical Security Domains Cabling Legal Botnet Flash Government VPN Business Continuity Identity Theft Tablets Tip of the week Outlook Digital Payment Samsung email scam Congratulations Save Money IT support Staten Islans Laptops Vulnerability Public Cloud Displays staten island managed services IT support Staten Island Business Management Notifications Managed IT Business Mangement IT Management Reliable Computing Twitter Hack Email Workplace Tips Virtual Assistant Paperless Office IT support New York City Upgrade Staten Island computer support Phishing Computing Business Computing Rental Service Language Knowledge Mobility Securty Office Tips Spyware Update Data Security Software License Freedom of Information Operating System Vendor Management Web Server Best Practices Drones Applications Administrator Apps Alert Remote Computing Time Management Mobile Device Management Cybercrime Printer Hardware Solutions Artificial Intelligence datto LiFi G Suite Television managed IT services staten island IT consulting Staten island computer support firms data recovery Staten Island Start Menu Office Digital Miscellaneous Meetings IT services NYC Microsoft Office Networking IT support firms end-user files In Internet of Things Staten Island IT consulting Virtualization Windows XP Lithium-ion battery eWaste Workers IT support Staten Island IT support Corporate Profile Running Cable Travel Computer Data Breach Backup News Recovery Google Maps Powerful Technology Solutions Black Market Google Drive Politics Staffing Training Tracking Cortana Android Company Culture Windows Business Metrics Experience Webcam Accidental deletion Automobile Social Engineering Access Control Technology Communication Emergency data recovery Security Unified Communications Text Messaging managed it services Hardware Virtual Reality The Internet of Things IT services New York City SharePoint Google Calendar Taxes Gadgets CryptoLocker Downtime Piracy Software as a Service Hard Drive Productivity IT consulting company computer support NYC Mobile Devices 3D Printing IT consulting Staten Island Computing Infrastructure Information Technology Touchscreen computer repair Spam computer services IT consulting NYC Password Machine Learning Disaster computer support Staten Island Holiday Smartphones Social Tablet Websites Firewall Software Collaboration Computer Malfunction Thank You IT consulting ransomware attacks Health Hard Drive Disposal Ransomware Innovation Deep Learning Settings Cost Management communications Search Scalability Malware Blockchain Budget YouTube Tech Terms Business Cards Employer Employee Relationship Privacy CCTV Compliance Scam Data Backup Wireless Saving Money Cloud computing Staten Island IBM Help Desk History Streaming Media End of Support Audit Automation managed services Staten Island Mobile Security malware Hard disk Data storage Managed IT Services Robot Small Business Telephony Flexibility Distributed Denial of Service Data Microsoft Excel Project Management Relocation Proactive IT Quick Tips Website Business Growth Administration IT Support Workstations tech support Gmail Visible Light Communication Windows 10 Windows 8 tech support Staten Island App Hiring/Firing Internet Redundancy BYOD Word CrashOverride IT Services Remote Monitoring PDF IT services Staten Island Two-factor Authentication Wi-Fi Best Practice Download Money Specifications Uninterrupted Power Supply Advertising Unified Threat Management Work/Life Balance Safety Desktop Supercomputer computer support Virtual Desktop Vulnerabilities Memory managed IT services NYC Bitcoin Network Analytics Writing Music Microchip IT consulting firm Outsourced IT Society managed services Patch Management Staten Island tech support Social Media Windows 10 Tech Support Disaster Recovery VoIP Office 365 Efficiency Vendor Mangement Chromebook Internet of Things Wireless Technology Augmented Reality Google IT Consultant Mobile Device computer services Staten Island IT support NYC Access Bring Your Own Device today ’s organizations Documents Sports Browser computer repair Staten Island Google Docs Fake News

Newsletter Sign Up