KT Connections Blog

KT Connections has been serving the Rapid City area since 1997, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Proper Hard Drive Disposal is An Involved Process

Proper Hard Drive Disposal is An Involved Process

When a business utilizes any kind of technology, there will come a time when that technology needs to be replaced--which means that the business will need to be sure that any data on the old machines cannot be recovered. This, in turn, means that the machine’s hard drive must be destroyed. In order to be absolutely certain that this has been accomplished, it helps to lean on the guidelines established by HIPAA.

Why HIPAA is Important
HIPAA, or the Health Insurance Portability and Accountability Act of 1996, was intended to do two things: first, protect the health insurance coverage of workers as they change their employment, and secondly (and more relevant to this topic) to protect the availability and privacy of health data. Part of preserving the privacy of this health data is ensuring that there aren’t extra copies of it lying around, waiting to be recovered.

This is a particularly crucial point, as medical professionals maintain a considerable amount of their patients’ data on their systems. Should they simply throw out an old computer without dealing with the hard drive (or upgrade to a new drive without doing the same) they open themselves up to serious consequences and liabilities. For this reason, HIPAA includes requirements that these providers must follow to prevent this from happening.

Destroying Data
Somewhat surprisingly, HIPAA doesn’t specifically outline any procedures for acceptable data destruction, although it does offer suggested methods. These range from magnetizing (or degaussing) the drive-in question to eliminate the data, to simply smashing it. Other common methods of destroying a disk drive involve running a drill through it.

However, to truly ensure your data security, you’ll want to take it a few steps further.

In order to really ensure your compliance to the standards outlined in HIPAA, it is best to lean on the resources of a professional. Rather than relying on blunt force trauma to destroy an unwanted drive, a pro can literally shred the drive with specialized equipment.

KT Connections can handle the disposal of your equipment on your behalf, allowing you to focus on putting your new solutions to work for your benefit. For more information, reach out to us at 605-341-3873.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, 23 January 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Privacy hackers Technology Email malware Internet Business Computing Network Security Cloud Google software User Tips Efficiency Backup Business Ransomware Data Microsoft Computer Android IT Support Small Business IT Support Mobile Device Management cybersecurity Gmail Mobile Devices Money VoIP Facebook Productivity Hardware Network Phishing Smartphone Windows Managed IT Services Hosted Solutions Business Continuity Internet of Things Cloud Computing Operating System Alert Microsoft Office Artificial Intelligence Data Security IT Management communications Windows 10 Data Management IT Services Hard Drive security cameras Disaster Recovery Passwords Antivirus Communication data breach End of Support Apple Nextiva vulnerability Update Business Management Encryption Managed IT Services Robot Smartphones Outlook Outsourced IT Networking Office 365 Bandwidth Cost Management Data storage Unified Communications Upgrade Social Media BDR Windows 10 Information Security Best Practice Holiday Start Menu security solutions Server Drones Social Engineering Spam News History Firewall Events Productivity Data Protection Word Browser Event Marketing Local Buzz Innovation Scam Lunch and Learn Save Money Law Enforcement Data Recovery Document Management SaaS Saving Money Bitcoin South Dakota Information Technology Cryptocurrency Politics Data Backup Hacking Digital App Automation Access Control Collaboration Big Data The Internet of Things IoT vulnerabilities Patch Management Apps BYOD Gadgets Remote Monitoring botnet Google Wallet Customer Service IBM Google Docs Project Management Analytics WiFi Search Legal YouTube Google Maps Flash Hard Drive Disposal Managed Service Provider Cache LiFi DDoS security precautions Kaseya Connect Mixer enterprise productivity software Monitors Fortinet VoIP Hosted Solution Lawyers Society IT Strategy Sarbanes-Oxley Act Streaming Media IT Security Computer Care Settings email scam Emergency Visible Light Communication Conference Vendors Email Security Displays Business Security IT Solutions Windows 8 Administration Unified Threat Management End User Testing Windows XP password manager LastPass Running Cable Freedom of Information Chamber of Commerce eWaste Workplace Tips Business Technology Communications How To Website Uninterrupted Power Supply Compliance Community Involvement Fast food Printing Proactive IT Time Management Quick Tips Attorneys Tech Support face user confidence Cabling Bluetooth Fake News Computing Infrastructure Office Tips Disaster Phone System Advertising Download Downloads Music Unified Threat Management Managed Services Printer Virtual Desktop surveillance cameras Safety Microsoft Excel Cortana Hardware as a Service Content Filtering Corporate Profile Programming healthcare Government Writing Google Calendar Business Cards Trend Micro LastPass Worker Rebrand communication device Knowledge HaaS Managed IT AtomBombing Cloud Backup Rapid City tool Virtual Reality File Sharing Business Communications Black Market Business Comunications Distributed Denial of Service VPN Press Release Google Play Store Web Servers Blockchain Applications appointment business owner Local Technology Tech Terms Vendor Mangement Virtual Machines Cleaning IoT Devices Workers Retail Comparison Physical Security Touchscreen Cybercrime Internet 101 Memory Excel Tips and Tricks communication solutions Sales Tax Business Mangement Risk Creep Webcam Penetration Testing Samsung Specifications Business Growth Websites Network Congestion Access botnet attack camera Virtualization identity theft Tip of the week Internet Connected Devices IT for Oil Companies Microsoft Bookings Deep Learning Social Phishing Scams Budget Laptop Remote Computing Dell ’s Sonicwall Global Management System Tablets Microsoft Office 365 Television Software as a Service media experience Virtual Assistant Redundancy Spyware Education macbook Risk Management Experience booking process Mobility Office Audit Google Drive Hack Virus IT Consultation Tablet Password Microsoft Office 365 features Mouse information Mobile Device DDoS attacks Kaseya Sports Event Vendor Management Maintenance Telephony Law IT Wireless Technology IT Assessment Solid State Drive SOX SharePoint Supercomputer base infrastructure Hacks Documents IT Consultant Phone Systen Automobile Text Messaging network security professionals security solution Notifications PDF Business Metrics Computing Training end-of-support date Playbook CrashOverride holiday season Marketing Chromebook Language Employer Employee Relationship Rental Service Flexibility Digital Payment breach methods UTM holidays Miscellaneous Reliable Computing Public Cloud Taxes Threat management scammers Twitter Scalability Paperless Office Protection scams Telephone Systems G Suite Travel Processors Health Computer Malfunction Employer-Employee Relationship Banking Sync Messenger Private Cloud Microchip 3D Printing CCTV Downtime Books IT service Web Server In Internet of Things Motion Sickness Meetings Piracy Reading Work/Life Balance Ordinary Computers Machine Learning Hiring/Firing Users Emails Software License Bring Your Own Device Relocation Tracking quantum computers Administrator Hacker Wi-Fi collaboration capabilities