Our Most Popular Managed Services

If you need help deciding what services are best for your business let us know.

Logo

 
 Popular Services
 (347) 830-7322

Logo

 

Tekie Geek Blogs

Proper Hard Drive Disposal is An Involved Process

Proper Hard Drive Disposal is An Involved Process

When a business utilizes any kind of technology, there will come a time when that technology needs to be replaced--which means that the business will need to be sure that any data on the old machines cannot be recovered. This, in turn, means that the machine’s hard drive must be destroyed. In order to be absolutely certain that this has been accomplished, it helps to lean on the guidelines established by HIPAA.

Why HIPAA is Important
HIPAA, or the Health Insurance Portability and Accountability Act of 1996, was intended to do two things: first, protect the health insurance coverage of workers as they change their employment, and secondly (and more relevant to this topic) to protect the availability and privacy of health data. Part of preserving the privacy of this health data is ensuring that there aren’t extra copies of it lying around, waiting to be recovered.

This is a particularly crucial point, as medical professionals maintain a considerable amount of their patients’ data on their systems. Should they simply throw out an old computer without dealing with the hard drive (or upgrade to a new drive without doing the same) they open themselves up to serious consequences and liabilities. For this reason, HIPAA includes requirements that these providers must follow to prevent this from happening.

Destroying Data
Somewhat surprisingly, HIPAA doesn’t specifically outline any procedures for acceptable data destruction, although it does offer suggested methods. These range from magnetizing (or degaussing) the drive-in question to eliminate the data, to simply smashing it. Other common methods of destroying a disk drive involve running a drill through it.

However, to truly ensure your data security, you’ll want to take it a few steps further.

In order to really ensure your compliance to the standards outlined in HIPAA, it is best to lean on the resources of a professional. Rather than relying on blunt force trauma to destroy an unwanted drive, a pro can literally shred the drive with specialized equipment.

Tekie Geek can handle the disposal of your equipment on your behalf, allowing you to focus on putting your new solutions to work for your benefit. For more information, reach out to us at (347) 830-7322.

Scam Leverages Email from a Reluctant Contract Kil...
Tip of the Week: Why You Should Reconsider Your Be...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, February 15, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Vendor Mangement Scalability Cooperation IT Services Displays Processors data recovery Staten Island Big Data CryptoLocker Politics Business Cards IT support New York City Machine Learning Staten Island IT consulting Social Media Voice over Internet Protocol Excel Advertising Freedom of Information Smartphones Unified Threat Management Data Security Wi-Fi Cryptocurrency Securty Business Technology Staffing SaaS Efficiency Safety Directions Social Engineering Downloads tech support Business Management Tech Terms Proactive IT HTML Google How To Operating System Company Culture Drones Database Data Backup Wireless Headphones Information Collaboration Holiday Two-factor Authentication Addiction Social Network Tracking BYOD Conferencing Bookmark Microchip Encryption computer services Managed IT Bring Your Own Device User Tips Social Windows Wireless email scam data loss IT consulting Staten Island IT Support Desktop Google Drive Powerful Technology Solutions Mobile Devices Uninterrupted Power Supply IT Consultant Maintenance News Startup malware Hard disk Passwords Recovery Corporate Profile Equifax Sports BDR managed IT services NYC Lithium-ion battery Productivity Laptop Email 3D Printing SharePoint Workstations Legal IT consulting NYC Multi-Factor Security Term Data Protection Outsourced IT Search Bluetooth Browsers Chromebook VoIP Writing The Internet of Things Backup and Disaster Recovery Browser Government Language History Congratulations Cybercrime Administration Device security Workplace Tips Piracy IT consulting firms Flexibility Windows XP YouTube Automobile Quick Tips Health IT Navigation Applications Saving Time Settings Small Business IT support firms Relocation Electronic Medical Records Tech Term data recovery Mobile Device Productivity Trends Experience Hardware Solutions Office 365 Website Emergency Unified Communications Technology Webcam Username Word Rental Service Work/Life Balance computer support Staten Island Hardware Managed Service Motion Sickness IT consulting company Regulation Managed IT Services Mobility Websites Upload Legislation managed IT services staten island Facebook Money Access Computer Mobile Technology User Tip Network Management Cloud Communication Health Gmail Virtual Assistant Staten Island tech support Fake News Software License Employer Employee Relationship Distributed Denial of Service Hosted Solution Virus Outlook Apple CrashOverride Cloud Computing Processor computer repair Staten Island today ’s organizations Cost Management Robot Firewall Administrator PDF Black Market Business Mangement managed it services Automation Digital Payment Blockchain In Internet of Things Web Server Text Messaging Virtual Reality Backup Networking Knowledge Disaster Recovery Spyware Hosted Solutions tech support Staten Isalnd Spam PowerPoint Alert Tip of the Week IBM malware worms Multi-factor Authentication Business Metrics Travel Office Tips Managed IT Services Business Continuity Specifications Best Practices Running Cable Going Green Analytics Documents end-user files Lenovo Entertainment computer support Taxes G Suite Gamification Business Computing CCTV Telephone Systems Television Mouse Streaming Media Start Menu Data Management Computing Supercomputer Hard Drive Disposal Music Scam Cabling Business Growth Windows 10 Monitors Education Cloud computing Staten Island Cortana IT support NYC Tablet Banking Best Practice Network Security End of Support LiFi Microsoft Excel Password Hack SSID Project Management Computers Mobile Device Management IT consulting Staten island Staten Island computer support Wireless Technology Workers Accidental deletion Managed Service Provider Security Cameras Memory IT support Staten Islans eWaste Thank You Apps Professional Services Healthcare Business Update Hacks Reliable Computing Emails Windows 8 Printers Google Maps Hackers Phishing Saving Money Hacking Notifications Antivirus Virtual Desktop Virtualization Users Remote Monitoring computer services Staten Island Tech Data Analysis Customer Resource management Data Devices computer support firms Telephone IT consulting Tech Support Access Control Training Google Play Employer-Employee Relationship Content Filtering Upgrade Compliance Managing Stress Data Breach Download Fileless Malware Customer Service Public Cloud Help Desk DDoS Windows 10 Server Budget Cache IT services New York City Vendor Management Visible Light Communication IT services NYC tech support Staten Island Medical IT staten island managed services Nanotechnology Internet of Things Miscellaneous Network Congestion Physical Security Computer Care Monitoring Redundancy Computing Infrastructure iPhone Document Management VoIP Data storage Laptops IT services Staten Island Router Worker Privacy Network Evernote Hiring/Firing Innovation Paperless Office Bandwidth Tactics Android Software Content Meetings Cybersecurity Bitcoin Printing Mobile Security Flash Error Printer Society Telephone System Staten Island IT support Vulnerabilities IT Management Microsoft Google Docs Modem communications Service Level Agreement Vendor Hacker Malware Internet ransomware attacks Security Time Management computer support NYC Information Technology Ransomware Augmented Reality Microsoft Office IT support Staten Island managed services Staten Island Domains Google Wallet Touchscreen App Office Cleaning Comparison Tablets Identity Theft Deep Learning Retail Digital Solid State Drive Law Enforcement Patch Management Private Cloud Gadgets Telephony Management it support Save Money Hard Drive Artificial Intelligence Remote Computing Botnet VPN Tip of the week Accountants File Sharing Audit Downtime Proxy Server Google Calendar Vulnerability datto Unified Threat Management WiFi Computer Malfunction Samsung computer repair IT support managed services Regulations Smartphone Software as a Service IT consulting firm Screen Reader Disaster Twitter

Newsletter Sign Up