Home Add to Favorite Contact Submit  
             03 May, 2024
 

    
Category:  Articles » Computers » Personal Tech

 

Computers Don't Lose Their Memory With Age

Popularity:
         Views: 2094
2007-06-07 11:17:32     
Article by Tim Margeson

Data privacy in today's age of the Internet, online information repositories and e-government has become more complex, particularly in healthcare environments: Securing protected health information is no longer as simple as locking a file folder in a cabinet.

Patient data such as drug regiments, psychological history or diagnostic imaging including x-rays and ultrasounds is now distributed across physical buildings and computers as healthcare professionals consult with one another and collaborate via e-mail and networks; this means it's more difficult to track where patient information is actually being stored. What is certain is that patient data is stored on computers - PCs, laptops at private practices or servers in a specific department - that will eventually be discarded or redeployed for another purpose.

Under HIPAA rules (PIPEDA in Canada), healthcare organizations must understand the flow of protected health information and must have mechanisms in place to secure access to that data. Take this a step further and it means discarded computer systems must not become a backdoor means to gain unauthorized access to confidential health information.

And while normally the primary concern of most healthcare organizations is to ensure that data is available to staff when they need it, the discarding of old computer systems is one occasion when going the extra mile to destroy confidential data is required so it does not fall into the wrong hands.

Data is a lot like DNA. It can be inherited. It can mutate. Typical computer users in the healthcare sector contain confidential material such as patient records, accounting records, x-rays, diagnostic images and much more. To a data recovery expert they are nothing more than "0s" and "1s" organized on the computer's hard disk drive and much easier to retrieve than one might think.

Data-ridden computers can be discarded in a number of ways. Sometimes they are turned in for newer models when leases retired, or they are simply "inventoried" and placed in a storage room to gather dust. Often old computers are donated to charity, auctioned off or sold to the general public with the data still residing on the hard drives.

Whether discarded individually or en masse, it's entirely possible that these computers still contain protected health information. Much of that data could be the software applications and trivial information, but frequently the information remaining on these computers can be extremely sensitive.

Lost, but not irretrievable

Data on computers, despite apparent loss due to natural disaster, equipment failure, human error or security breaches, is rather resilient. Data often thought irrevocably lost can be and is frequently retrieved by data recovery specialists. Likewise, data thought deleted from a system is often still resident on a discarded computer's hard drive.

Data removal procedures go beyond the simple deletion of a file from the computer user's desktop. There are methods and techniques that are used by individuals who come into possession of previously used systems who can reconstruct data even after the storage media has been erased.

What many users don't realize is that when most computers delete a file, the contents of the file are not actually removed: the file, at least in the short term, is still resident on the hard drive, but it's no longer linked to the file system. The data remains on the disk until the operating system re-uses those sectors to write new data.

In order to confirm a deleted file is really deleted, it is necessary to overwrite the data sectors of that file. Until the old data is actually overwritten by new information it can be recovered by programs that read disk sectors directly, such as forensic software, commercially available data retrieval software or data recovery techniques. As result, data thought to be deleted may remain on the drive if the sectors are not overwritten.

There are a number of ways to ensure the destruction or inaccessibility of data on hard drives: degaussing, overwriting, data encryption and media destruction are some of the methods that have been employed to safeguard against disclosure of sensitive information.

Wiping

The wiping of sensitive data from a computer's hard drive or a removable storage device is the best method of data destruction to guarantee the data can't be reconstructed through laboratory techniques. Wiping is essential when hardware containing sensitive data is moved from a secure facility to a non-secure facility or environment. Software-based data destruction methods are inexpensive and easy to use for the average computer user, Software used for data purging is available on the market from a number of vendors.

Degaussing

A more severe approach to data erasure is degaussing, which often renders hard drives inoperable. Degaussing is a process whereby the magnetic media is erased. As a result, degaussing can prevent computers from being recycled for educational use, charitable donation or resale to the general public. The sensitivity of the data stored on the computer and the feasibility of software purging should be weighed before one makes the decision to degauss hard drives.

Clearing

A less extreme means of data erasure is the removal of sensitive data from storage devices in such a way that there is assurance, proportional to the sensitivity of the data, that the data may not be reconstructed using normal system capabilities. Clearing is feasible when the storage media is reused within the same computer and same office. For example, if the computer is simply being cleaned up for a new staff member taking over from a departing staff member, it is remaining in the same controlled environment.

Clearing can be accomplished by overwriting the unassigned system storage space on the disk. A single overwrite of a file or all system storage is usually enough to make sure that previous information cannot be rebuilt.

As mentioned earlier, simply deleting a file only removes the directory pointers to the file; the digital information is still on the computer until overwritten. Even reformatting, or repartitioning a hard drive is not enough to guaranteed that the files are completely gone, even if the end user can't browse them or open them with an application.

Ultimate destruction

In extreme cases where the destruction of data must be guaranteed and the chance of retrieval must be eliminated, physical destruction of the hardware is the best course of action. Media may generally be destroyed by using a number of methods, including an abrasive substance on magnetic disk or drum recording surface. Corrosive chemicals can have the same desired effect, but regardless, the entire recording surface must be completely removed before disposal. Destruction of drive (or the entire computer, for that matter) can also be achieved by being smelted, disintegrated or incinerated at a metal destruction facility or through incineration. Even if the decision is made to destroy the hardware completely, it is still a good idea to purge media before submitting it for destruction.

Hold on a second!

While making sure sensitive data does not fall into the rights should be established policy, it is important to make sure that data is no longer needed; if it is, make sure it can be found on another computer or server.

Before disposing of any computer hardware, be sure to back up the data in a secure location. Just because the computer is no longer needed, doesn't mean the data isn't still required, and that data may not be found anywhere else in the organization. There could also be legal requirements for maintaining certain information, including medical records long after the patient has left the facility

Ultimately, however, the safeguarding of protected health information is critical and properly removing this sensitive information from computer hard drives must be incorporated within any other security and privacy policies and processes.

Specialized in: Data Recovery - Hard Drive Recovery - Raid Data Recovery - Drive Recovery - Recover Deleted Files - Data Recovery Software - Email Recovery - Data Recovery Services - Data Recovery Freeware - Forensics - Laptop Recovery
URL: http://www.cbltech.com
Print article      Bookmark this page
Related Articles 
Smart Hints in Using Fiber Optic TV (Popularity: ): Do you want to have a certain TV in higher definition? If so, you can consider fiber optic. This certain technology offers extensive programming as well as high reliability. You might find several differences with your standard TV, but you can still use fiber optic model for your device. You will not need to buy any expensive equipment, since you can rent it from your TV provider.Before consider using this ...
Antivirus 7 Removal - How to Remove Antivirus 7 the Easy Way (Popularity: ): Antivirus 7 is one of the latest "rogue antivirus" programs to be unleashed onto the Internet. These programs look like normal antivirus tools, but are designed specifically to hound & annoy you, until you give in and buy the upgraded version of this software. Little do many people know that Antivirus 7 does not do anything to improve your PC's performance or security. In fact, it will do more damage ...
Windows Administrator Password Recovery Tutorial (Popularity: ): If you have lost your administrator for Windows and cannot login to your PC, the good news is that it is possible to change the password that you have. To do this, you can just use a simple program which basically logs into your hard drive and changes the stored password files which Windows uses to enforce your password.There are programs available which are able to log onto your system ...
Three Important Features You Want in Voice Activated Tape Recorders (Popularity: ): While recording speeches, meetings, or interviews, pauses are usually found along with voice. When the recorder starts recording everything including pauses, a lot of space in the tape will be wasted. Also, a lot of time is wasted when you play back the speech because of unwanted silence in the middle of the recordings. This can be eliminated if you can choose a recorder that records only voices.Voice activated tape ...
CPU Stress Test - See What Your Computer Can Handle (Popularity: ): The central processing unit (CPU) of a computer is sometimes put through what is known as a CPU stress test. This type of test can help an IT tech to determine the ability of a computer to handle certain situations. Oftentimes, IT technicians will want to make modifications to certain parameters that operate the CPU that they are evaluating, such as when under-clocking (which allows a CPU to operate at ...


Related Business 
Five Stars Law (Popularity: ): Let’s dispense with the obvious. If you’re drunk, then don’t drive. Don’t drive, because you don’t want to hurt someone else or yourself. Don’t drive, because you don’t want to smash up your car or damage someone else’s property. And finally, don’t drive, because you don’t want to get arrested, lose your license, pay huge fines, have your insurance go through the roof and perhaps even lose your job.
Quickest Way To Lose Weight Free Advice (Popularity: ): It is impossible to lose weight fast if you don't plan to excersice yourself daily! You love bicycling, swiming or walking? Now you have a good reason to enjoy your hobbies! Try to find at least 30min and excercise yourself. Don't forget that you should focus on sports that increase your heart rate (aerobics) and avoid focusing on building your muscles.
Advantage Memory (Popularity: ): Manufacturer of quality memory products for all types of computers.
Memory Galaxy (Popularity: ): Specializing in memory for computers, laptops, printers, and routers.
Aristo Computers (Popularity: ): Memory testers. The SIMCHECK memory testing line tests SIMMs, DIMMs, and DRAMs.
Offtek Computer Memory Upgrades (Popularity: ): UK online store and memory configurator for computers, printers and electronic devices.
Arch Memory (Popularity: ): Offers ram memory upgrades online for a complete range of computers, laptops, printers, and servers.
Bix Computers (Popularity: ): Laptop and notebook computers, plus memory, hard drives, and batteries.
Weight loss (Popularity: ): We are proud to introduce our new line of unique and effective weight loss and skin care products. Natural ingredients, highest quality, best service, best results -- that's our commitment. Our products are designed to help you lose weight, lose weight fast, lose a dress size, maintain your figure, increase energy, drop a dress size, improve memory, and keep your beauty forever. We are an authorized distributor of these fantastic ...
Memory Man, Inc. (Popularity: ): Memory Man is selling lots of RAM Memory Upgrades and Laptop Memory Upgrades at best price with good brand. Computer memory ram, RAM memory upgrades, compact flash memory cards, ram computer memory, ddr2 4200 533mhz, rambus memory, laptop memory ram, ddr2 6400 800mhz, ram for laptop and ram memory upgrade.