Get Started Today!  217-475-0226

Decatur Computers Inc. Blog

Decatur Computers Inc. has been serving the Decatur area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Proper Hard Drive Disposal is An Involved Process

Proper Hard Drive Disposal is An Involved Process

When a business utilizes any kind of technology, there will come a time when that technology needs to be replaced--which means that the business will need to be sure that any data on the old machines cannot be recovered. This, in turn, means that the machine’s hard drive must be destroyed. In order to be absolutely certain that this has been accomplished, it helps to lean on the guidelines established by HIPAA.

Why HIPAA is Important
HIPAA, or the Health Insurance Portability and Accountability Act of 1996, was intended to do two things: first, protect the health insurance coverage of workers as they change their employment, and secondly (and more relevant to this topic) to protect the availability and privacy of health data. Part of preserving the privacy of this health data is ensuring that there aren’t extra copies of it lying around, waiting to be recovered.

This is a particularly crucial point, as medical professionals maintain a considerable amount of their patients’ data on their systems. Should they simply throw out an old computer without dealing with the hard drive (or upgrade to a new drive without doing the same) they open themselves up to serious consequences and liabilities. For this reason, HIPAA includes requirements that these providers must follow to prevent this from happening.

Destroying Data
Somewhat surprisingly, HIPAA doesn’t specifically outline any procedures for acceptable data destruction, although it does offer suggested methods. These range from magnetizing (or degaussing) the drive-in question to eliminate the data, to simply smashing it. Other common methods of destroying a disk drive involve running a drill through it.

However, to truly ensure your data security, you’ll want to take it a few steps further.

In order to really ensure your compliance to the standards outlined in HIPAA, it is best to lean on the resources of a professional. Rather than relying on blunt force trauma to destroy an unwanted drive, a pro can literally shred the drive with specialized equipment.

Decatur Computers Inc. can handle the disposal of your equipment on your behalf, allowing you to focus on putting your new solutions to work for your benefit. For more information, reach out to us at 217-475-0226.

Scam Leverages Email from a Reluctant Contract Kil...
Tip of the Week: Why You Should Reconsider Your Be...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 17 March 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Privacy Best Practices Business Computing Hackers Network Security Cybersecurity IT Support Malware Backup Technology Email Small Business Managed IT Services User Tips Ransomware Google Software Android Business Management Efficiency Cloud Productivity Data Smartphone IT Management Windows 10 Internet Phishing Communications Update Artificial Intelligence Hardware Antivirus Innovation Mobile Device Management Cybercrime Gadgets Business Outsourced IT Data Recovery Data Security Cost Management Hard Drive Internet of Things Data Management Bitcoin Facebook Disaster Recovery Maintenance Saving Money Remote Monitoring Social Engineering App Blockchain Microsoft Office Data Protection BDR Alert Data Backup Gmail Business Technology Word Vulnerabilities Digital IT Services Apps Collaboration Patch Management Scam Holiday Websites Laptop SaaS Network Money Computer Search Business Continuity Hacking Touchscreen Save Money Project Management Access Control Office 365 Microsoft Start Menu Law Enforcement Passwords Browser Windows VPN Encryption Server Mobility Operating System Mouse Administration Consultant Two-factor Authentication Managed IT Services DDoS Time Management Corporate Profile Uninterrupted Power Supply eWaste Information Technology Managed IT Worker Multi-factor Authentication Password Computer Care Robot Google Calendar Mobile Technology Cloud Computing Device security Samsung Excel Spam Unified Threat Management History Unified Threat Management Document Management Augmented Reality Automation Outlook SharePoint Website Disaster Tip of the week Vendor Mangement IBM Computing Infrastructure Hosted Solutions Google Docs Virtual Reality Automobile Distributed Denial of Service Access Tech Term Business Mangement Best Practice Unified Communications Networking Employer-Employee Relationship Budget Company Culture Redundancy Freedom of Information Spyware HTML Knowledge Cortana Software as a Service Tablet Unsupported Software Printing Business Cards Smartphones Identity Theft News Analytics Tech Terms Virtual Assistant Social Media How to Government Comparison Desktop Fake News Mobile Device Google Drive Legal Downtime Virus Upgrades Data Breach Managed Service Provider Big Data Telephony Google Maps Hard Drive Disposal Downloads Piracy Specifications YouTube Running Cable Applications Emergency Microsoft Excel VoIP Solid State Drive WiFi email scam VoIp Software License Television Settings Telephone Systems Cabling Mobile Security IT Support Vulnerability Cryptocurrency Wireless Audit Mobile Devices CrashOverride Office Users Office Tips Data loss Devices Compliance Windows 10 Regulations Marketing

Latest Blog

If you’ve ever felt as though someone was watching what you were doing while you were working remotely, either at home or in public, there’s a chance that you were right. Without a private Internet connection, it is a simple matter for others to watch your processes and stea...

Latest News

Decatur Computers Inc. is proud to announce the launch of our new website at The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.