LiveChat Live Help
Contact us today!
(248) 218-5018
facebooktwittergooglelinkedinyoutubeExpetec Technology Services RSS Feed

Expetec Technology Services Blog

Expetec Technology Services has been serving the Troy area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Proper Hard Drive Disposal is An Involved Process

Proper Hard Drive Disposal is An Involved Process

When a business utilizes any kind of technology, there will come a time when that technology needs to be replaced--which means that the business will need to be sure that any data on the old machines cannot be recovered. This, in turn, means that the machine’s hard drive must be destroyed. In order to be absolutely certain that this has been accomplished, it helps to lean on the guidelines established by HIPAA.

Why HIPAA is Important
HIPAA, or the Health Insurance Portability and Accountability Act of 1996, was intended to do two things: first, protect the health insurance coverage of workers as they change their employment, and secondly (and more relevant to this topic) to protect the availability and privacy of health data. Part of preserving the privacy of this health data is ensuring that there aren’t extra copies of it lying around, waiting to be recovered.

This is a particularly crucial point, as medical professionals maintain a considerable amount of their patients’ data on their systems. Should they simply throw out an old computer without dealing with the hard drive (or upgrade to a new drive without doing the same) they open themselves up to serious consequences and liabilities. For this reason, HIPAA includes requirements that these providers must follow to prevent this from happening.

Destroying Data
Somewhat surprisingly, HIPAA doesn’t specifically outline any procedures for acceptable data destruction, although it does offer suggested methods. These range from magnetizing (or degaussing) the drive-in question to eliminate the data, to simply smashing it. Other common methods of destroying a disk drive involve running a drill through it.

However, to truly ensure your data security, you’ll want to take it a few steps further.

In order to really ensure your compliance to the standards outlined in HIPAA, it is best to lean on the resources of a professional. Rather than relying on blunt force trauma to destroy an unwanted drive, a pro can literally shred the drive with specialized equipment.

Expetec Technology Services can handle the disposal of your equipment on your behalf, allowing you to focus on putting your new solutions to work for your benefit. For more information, reach out to us at (248) 218-5018.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, 23 January 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Sign Up for Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!


      Tag Cloud

      Security Tip of the Week Privacy Technology Best Practices Cloud Internet hackers Business Computing Productivity Business malware IT Support Backup Microsoft Email Software Network Security Data IT Services Hardware Efficiency Hosted Solutions Managed Service Provider Mobile devices User Tips Mobile Device Management Computer Disaster Recovery Workplace Tips Google Business Management Microsoft Office Smartphone Android Holiday Ransomware Miscellaneous Remote Monitoring Smartphones Network analytics Virtualization Windows Business Continuity The Internet of Things Operating System Small Business BYOD Remote Computing Collaboration Server Social Media Cybersecurity Mobile Computing VoIP WiFi Passwords Unified Threat Management Phishing Alert IT Support Managed IT Services Big Data BDR Outsourced IT Upgrade Windows 10 Save Money Saving Money Innovation Gmail Office communications Managed IT Data Management Firewall Vendor Management apple Facebook Artificial Intelligence History Budget Communication Internet of Things Lithium-ion battery Outlook Search Productivity Quick Tips Employer-Employee Relationship Managed IT services Browser Windows 10 Hard Drives Save Time Help Desk Information Technology Cost Management Saving Time Hacking Hiring/Firing Content Filtering App Bandwidth Best Practice Recovery Encryption Proactive IT Money Update Marketing Document Management IT Management Automation Running Cable Wireless Technology Customer Service Apps Antivirus Spam Two-factor Authentication Word Health Law Enforcement Bring Your Own Device Data storage Mobility SaaS Tech Support Intranet Office 365 Hard Drive Hosted Solution Data Backup User Robot Networking Data Recovery Disaster Cybercrime tablet IT Consultant Gadgets IBM Project Management Password Flexibility Training Cryptocurrency Unified Threat Management Start Menu IT service Computers Website Social Networking Retail Travel Uninterrupted Power Supply Government Current Events Going Green avoiding downtime Monitors Wireless Documents Mobile Device PowerPoint Google Docs Scam Net Neutrality Software as a Service Google Maps Downtime Compliance Experience Cloud Computing VPN Legal Chrome Company Culture Safety Phone System Administration Virtual Desktop eWaste Maintenance Computing Infrastructure Access Control DDoS Bitcoin End of Support Risk Management Specifications Heating/Cooling Telephone Systems Data Security YouTube Patch Management Virus Education Unified Communications Cortana Presentation Business Growth Comparison Social Excel iphone Network Congestion Laptop Digital Business Intelligence Telephony Programming Solid State Drive Computing Value Downloads Drones Emergency CIO Access Computer Accessories Windows Server 2008 Read Risk Mangaement Human Resources LinkedIn Computer Care Storage Fiber-Optic Skype Electronic Payment Competition Google Calendar Vulnerability User Error IT consulting Spyware File Sharing Windows 7 Cleaning Touchscreen Entrepreneur Fraud Application Bluetooth Technology Tips Business Technology Sports Windows XP Cache Domains Politics Freedom of Information Society Websites Troubleshooting Router email scam Product Reviews Data Protection Settings Assessment Public Cloud News Displays Windows 8 Business Owner Vulnerabilities Corporate Profile PDF Mobile Technology Office Tips Knowledge Consultation Fake News Upgrades USB Printer Trending Inbound Marketing Business Cards VoIP Co-Managed IT Mobile Payment Micrsooft Tech Terms LiFi Bata Backup How To Microsoft Excel Online Currency Computer Repair Staffing Cabling Capital Television Visible Light Communication Vendor Mangement Customer Relationship Management Pain Points Content Management Music Worker Productuvuty Environment Public Speaking Digital Signature Mouse Statistics Deep Learning Advertising Business Mangement Sync HIPAA Blockchain Writing Teamwork Black Market Securty Licensing Entertainment Keyboard Streaming Media Electricity Hacker SharePoint Data Loss Hack Tip of the week Shortcut Audit Archive Redundancy Data Breach WannaCry IP Address Social Engineering Evernote Gaming Console Permissions Google Drive Distributed Denial of Service Virtual Assistant Regulations Best Available Printing Google Wallet switches Augmented Reality Data Warehousing Time Management Processors Emails Hard Drive Disposal

      Top Blog

      Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...