Our Most Popular Managed Services

If you need help deciding what services are best for your business let us know.


 Popular Services
 (347) 830-7322



Tekie Geek Blogs

Proper Hard Drive Disposal is An Involved Process

Proper Hard Drive Disposal is An Involved Process

When a business utilizes any kind of technology, there will come a time when that technology needs to be replaced--which means that the business will need to be sure that any data on the old machines cannot be recovered. This, in turn, means that the machine’s hard drive must be destroyed. In order to be absolutely certain that this has been accomplished, it helps to lean on the guidelines established by HIPAA.

Why HIPAA is Important
HIPAA, or the Health Insurance Portability and Accountability Act of 1996, was intended to do two things: first, protect the health insurance coverage of workers as they change their employment, and secondly (and more relevant to this topic) to protect the availability and privacy of health data. Part of preserving the privacy of this health data is ensuring that there aren’t extra copies of it lying around, waiting to be recovered.

This is a particularly crucial point, as medical professionals maintain a considerable amount of their patients’ data on their systems. Should they simply throw out an old computer without dealing with the hard drive (or upgrade to a new drive without doing the same) they open themselves up to serious consequences and liabilities. For this reason, HIPAA includes requirements that these providers must follow to prevent this from happening.

Destroying Data
Somewhat surprisingly, HIPAA doesn’t specifically outline any procedures for acceptable data destruction, although it does offer suggested methods. These range from magnetizing (or degaussing) the drive-in question to eliminate the data, to simply smashing it. Other common methods of destroying a disk drive involve running a drill through it.

However, to truly ensure your data security, you’ll want to take it a few steps further.

In order to really ensure your compliance to the standards outlined in HIPAA, it is best to lean on the resources of a professional. Rather than relying on blunt force trauma to destroy an unwanted drive, a pro can literally shred the drive with specialized equipment.

Tekie Geek can handle the disposal of your equipment on your behalf, allowing you to focus on putting your new solutions to work for your benefit. For more information, reach out to us at (347) 830-7322.

Scam Leverages Email from a Reluctant Contract Kil...
Tip of the Week: Why You Should Reconsider Your Be...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, 28 May 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Artificial Intelligence Recovery Data Security Email Cloud IT support Internet Managed IT Comparison Laptops communications Tech Support eWaste Backup Cybercrime LiFi Equifax Redundancy Disaster CrashOverride Business Continuity Cybersecurity Outlook Fake News end-user files Best Practice Deep Learning Apps IT support NYC Upgrade VPN IT support Staten Islans Hosted Solutions In Internet of Things Visible Light Communication Data Management Staten Island IT consulting computer support firms Uninterrupted Power Supply Analytics Bring Your Own Device Applications Outsourced IT Administrator Hosted Solution Running Cable Training Education Search Health Lithium-ion battery Ransomware datto IT support Staten Island malware worms Virtualization tech support Staten Island Information Technology Travel Staten Island IT support Business Metrics Public Cloud Microchip Service Level Agreement Virtual Reality Browser Printing tech support Staten Isalnd Domains Computing Powerful Technology Solutions Managed IT Services Google Wallet Hardware Security Cost Management Motion Sickness Computer Care Virus Server Miscellaneous computer services Staten Island Emails Tech Term staten island managed services Hard Drive Music managed services Staten Island Remote Computing IT consulting firms Alert Staffing Cloud computing Staten Island computer services it support Software License Bluetooth Corporate Profile News managed IT services NYC Staten Island tech support Hacking Vendor Management Audit Two-factor Authentication Relocation managed services Desktop User Tips Accidental deletion Writing Telephone Systems Digital data loss Mobile Devices Device security Scalability IT services Staten Island Bitcoin Settings BDR Managed Service Provider Mobile Technology Law Enforcement Botnet Data Government computer repair Staten Island Tracking Mobility Screen Reader Gmail Project Management Legal Managed IT Services Office Tips Phishing Samsung Password IT consulting NYC Mouse CCTV Distributed Denial of Service Tactics Hard Drive Disposal Augmented Reality Remote Monitoring Startup Compliance End of Support email scam Regulations Malware Software as a Service YouTube HTML Television Social Antivirus Employer-Employee Relationship Unified Threat Management Windows Google Specifications Paperless Office Hacks Network Congestion Privacy Google Docs Black Market IT consulting company CryptoLocker Content Filtering IT consulting Customer Service Innovation Download Safety Business Growth Smartphone Gadgets Network Management Windows 8 Blockchain Microsoft Excel IT services New York City Legislation computer support managed it services Software Machine Learning SaaS Document Management Spam Wireless Technology Networking Virtual Desktop Operating System Word Thank You Website Processors today ’s organizations Politics Vulnerability Streaming Media Reliable Computing Communication Sports Downloads DDoS PDF managed IT services staten island Save Money Google Maps Business Technology Windows XP Company Culture Saving Money Experience Staten Island computer support IT support firms Robot Virtual Assistant Business Mangement IT Consultant Data storage Downtime Securty Freedom of Information Multi-Factor Security Vulnerabilities Computer Malfunction Twitter Websites Automation Advertising Automobile Flash Access Office 365 IT consulting Staten Island G Suite Network Security Windows 10 Wireless Workstations computer repair Administration Passwords BYOD Banking Hardware Solutions Money Patch Management Solid State Drive Laptop Tablets Efficiency Windows 10 IT consulting firm Devices Work/Life Balance computer support Staten Island malware Hard disk Flexibility Mobile Device Firewall Piracy Workers Hacker Drones Disaster Recovery Hackers Best Practices Text Messaging Telephony Notifications Android How To Office Maintenance Wi-Fi Hiring/Firing Spyware Displays Supercomputer Computer VoIP Bandwidth Hack Multi-factor Authentication Social Media Data Protection Tech Terms Lenovo Addiction Tablet Cleaning Smartphones Data Breach Update Collaboration ransomware attacks Digital Payment Internet of Things data recovery Staten Island Worker Computing Infrastructure Cortana Congratulations Microsoft Office Cryptocurrency Unified Communications History Mobile Security Documents Society Emergency Network Wireless Headphones Monitors IT consulting Staten island 3D Printing Time Management Database The Internet of Things Google Drive IBM Private Cloud Identity Theft Business Computing Facebook Small Business computer support NYC Data Backup Big Data Apple Scam Nanotechnology Physical Security Mobile Device Management Cabling Webcam Social Engineering SharePoint IT services NYC Employer Employee Relationship VoIP Conferencing Productivity Quick Tips Workplace Tips WiFi Technology Business Cards App IT Support Memory Start Menu Microsoft Proactive IT Excel IT support New York City Touchscreen Cloud Computing Retail Help Desk Meetings IT Services Backup and Disaster Recovery Vendor Mangement Chromebook Accountants Budget Printer Business Holiday Google Calendar Productivity Computers File Sharing Tip of the week Knowledge tech support Web Server Tip of the Week Cache Unified Threat Management Business Management Taxes IT Management Rental Service Encryption data recovery Language Access Control

Newsletter Sign Up