Our Most Popular Managed Services

If you need help deciding what services are best for your business let us know.


 Popular Services
 (347) 830-7322



Tekie Geek Blogs

Proper Hard Drive Disposal is An Involved Process

Proper Hard Drive Disposal is An Involved Process

When a business utilizes any kind of technology, there will come a time when that technology needs to be replaced--which means that the business will need to be sure that any data on the old machines cannot be recovered. This, in turn, means that the machine’s hard drive must be destroyed. In order to be absolutely certain that this has been accomplished, it helps to lean on the guidelines established by HIPAA.

Why HIPAA is Important
HIPAA, or the Health Insurance Portability and Accountability Act of 1996, was intended to do two things: first, protect the health insurance coverage of workers as they change their employment, and secondly (and more relevant to this topic) to protect the availability and privacy of health data. Part of preserving the privacy of this health data is ensuring that there aren’t extra copies of it lying around, waiting to be recovered.

This is a particularly crucial point, as medical professionals maintain a considerable amount of their patients’ data on their systems. Should they simply throw out an old computer without dealing with the hard drive (or upgrade to a new drive without doing the same) they open themselves up to serious consequences and liabilities. For this reason, HIPAA includes requirements that these providers must follow to prevent this from happening.

Destroying Data
Somewhat surprisingly, HIPAA doesn’t specifically outline any procedures for acceptable data destruction, although it does offer suggested methods. These range from magnetizing (or degaussing) the drive-in question to eliminate the data, to simply smashing it. Other common methods of destroying a disk drive involve running a drill through it.

However, to truly ensure your data security, you’ll want to take it a few steps further.

In order to really ensure your compliance to the standards outlined in HIPAA, it is best to lean on the resources of a professional. Rather than relying on blunt force trauma to destroy an unwanted drive, a pro can literally shred the drive with specialized equipment.

Tekie Geek can handle the disposal of your equipment on your behalf, allowing you to focus on putting your new solutions to work for your benefit. For more information, reach out to us at (347) 830-7322.

Scam Leverages Email from a Reluctant Contract Kil...
Tip of the Week: Why You Should Reconsider Your Be...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, August 21, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Word Communication Cache Wireless Technology VPN Windows Document Management tech support Staten Isalnd Hardware Windows 8 Data storage Private Cloud IT consulting firm Lithium-ion battery Bandwidth data recovery Staten Island Television Running Cable ransomware attacks Disaster Recovery Scam Touchscreen Content computer services Wi-Fi malware Hard disk Virtual Reality Windows 10 Gamification Information Experience Hacking Unified Threat Management Business Mangement Google Drive IT consulting Staten island IT support Digital Office 365 Software as a Service Cloud Mobile Device Unified Communications Microsoft Excel Email Google Maps Social Network Multi-Factor Security Devices Notifications Business Computing Computer Care Backup and Disaster Recovery Workstations Distributed Denial of Service Administrator Workers computer repair Staten Island Printer User Tips IT services Staten Island Cortana Recovery Google Supercomputer Drones Gadgets Society Going Green Documents The Internet of Things Fake News Networking Money Social Engineering Alert Apple Social Media Settings Facebook Cloud computing Staten Island Content Filtering Miscellaneous Upgrade communications Government Google Calendar Text Messaging Budget Mouse Addiction IT consulting company Business Cards Education Best Practices Productivity Blockchain Desktop IBM eWaste Business Continuity Language Encryption Redundancy Managed Service Provider Scalability Machine Learning computer support Staten Island Tip of the week Mobile Devices Music Hacker Domains In Internet of Things Downtime Project Management Cost Management managed services Telephony Browser Software SharePoint IT consulting Tablet Virtual Assistant IT support New York City Printing Equifax Device security Digital Payment Cabling Business Technology Travel Vulnerability Excel Powerful Technology Solutions Microsoft Analytics Virtualization tech support Staten Island IT Management IT services NYC Update Training Tech Support Office Cybercrime data recovery Staten Island IT consulting Virtual Desktop Security Operating System Passwords End of Support IT consulting NYC Network Security Big Data Data Backup Network Management Small Business Regulation Remote Monitoring Hacks Emails Knowledge Computing Infrastructure Data Access Managed IT Username HTML Uninterrupted Power Supply Mobility Hack Freedom of Information Retail CrashOverride end-user files Virus Piracy Nanotechnology Managed IT Services Staffing Banking Data Protection Employer Employee Relationship Office Tips Vulnerabilities Data Management Laptop Writing Mobile Device Management managed IT services NYC Tech Terms Password Microchip Company Culture Accidental deletion Employer-Employee Relationship Downloads CryptoLocker Workplace Tips Public Cloud Upload Compliance Computer Malfunction Taxes Identity Theft Start Menu Webcam Unified Threat Management Cryptocurrency Specifications Network Disaster IT support firms Meetings LiFi Administration IT consulting firms Congratulations VoIP Hosted Solution computer repair How To Securty Streaming Media Innovation Phishing Hardware Solutions Staten Island IT support Audit Emergency Motion Sickness Monitoring Bring Your Own Device it support Artificial Intelligence Spyware Vendor Management PDF Corporate Profile Health Thank You Mobile Technology Safety Internet of Things Comparison Flexibility Wireless Headphones malware worms Conferencing BYOD Cleaning Staten Island computer support Flash computer support Google Docs IT services New York City Backup Processors Computers Screen Reader Trends IT Consultant Botnet Hosted Solutions History IT support Staten Islans Quick Tips Samsung BDR computer services Staten Island Smartphones Database staten island managed services Business Management managed it services Deep Learning Tactics Accountants Black Market Data Security Worker Patch Management Proactive IT Search IT support Staten Island IT support NYC Maintenance Spam Managed Service Legal WiFi Data Breach Computing Managing Stress Android Time Management Two-factor Authentication managed services Staten Island Automation Software License Website Smartphone Work/Life Balance Business Growth Help Desk Efficiency Management Remote Computing Technology Solid State Drive Laptops Hard Drive Holiday Wireless App Paperless Office tech support Windows 10 Regulations Microsoft Office Rental Service Internet Save Money DDoS Google Wallet Startup Tablets IT Support Tracking data loss Relocation Physical Security Applications Memory Saving Money email scam Tech Term Cybersecurity Automobile managed IT services staten island Access Control Managed IT Services computer support NYC Network Congestion Web Server Hiring/Firing Vendor Mangement IT Services Lenovo Reliable Computing Hard Drive Disposal YouTube Error SaaS IT consulting Staten Island G Suite Best Practice Information Technology Advertising Customer Service Tip of the Week News Business Server Download computer support firms Augmented Reality Law Enforcement Visible Light Communication Computer File Sharing datto Privacy Business Metrics Multi-factor Authentication Twitter Chromebook Bluetooth Cloud Computing Legislation Service Level Agreement Apps VoIP Customer Resource management Collaboration Sports Telephone Firewall Bitcoin Windows XP Antivirus today ’s organizations Robot Telephone Systems Social Staten Island tech support Outsourced IT Mobile Security Displays Outlook Malware 3D Printing CCTV Hackers Productivity Websites Monitors Ransomware Politics Gmail

Newsletter Sign Up