Using hard drive full disc encryption for safety of electronic data

by | Jan 24, 2011

Healthcare providers often stand at the risk of losing confidential and personal data when laptop computers are misplaced or stolen. Companies large and small, public and private, are all at risk.

The real and associated costs of data breaches are staggering: In 2006, corporations that experienced a data breach spent an average of $5 million trying to recover data. Customer relationships suffer, too; among consumers that discovered their data had been lost, 20 percent terminated their relationships with the company, another 40 percent considered terminating their relationships, and 5 percent considered legal action.

Federal laws such as the Gramm-Leach-Bliley Act and the Health Insurance Portability and Accountability Act (HIPAA) make the security of critical digital content–including the secure disposal of electronic files to end the data lifecycle–a fundamental requirement. On a state by state basis, 29 states thus far have enacted data protection legislation and 28 of these laws have provisions calling for the encryption of digital content.

Healthcare providers can opt for hard drive full disc encryption which protects everything with a single mechanism and point of entry. Hard drive full disc encryption is straightforward; it automatically protects every bit of computer data without any human intervention. It makes any data stored on a stolen or lost notebook unreadable and unusable forever. It can also automatically “repurpose” existing laptops or deny access to data when computers reach the end of their useful life. By simply changing the encryption key on the disc, all stored data is instantaneously rendered unreadable and unusable forever–saving both time and money.

The advantages of hard drive full disc encryption are clear; the dangers of stolen and misplaced laptops are overwhelming. To thoroughly protect sensitive information, government and business organizations must mandate hard drive full disc encryption–especially for mobile workers–to help keep data from falling into the wrong hands. The time to lock laptops down is now.

3-Steps to HIPAA Compliance

Step 1 : Download Checklist.

Step 2 : Review Your Business

Step 3 : Get Compliant!

Our HIPAA compliance checklist will outline everything your organization needs to become fully HIPAA compliant. Fill in the form below to download it now.

View our privacy policy