I'm curious if people are doing the same data destruction methods when addressing media re-use for workstatoins.  When a workstation is being redeployed to another member of the workforce, just in a different job role, are you sanitizing or overwriting multiple times with patterns?  Or do you consider re-imaging (re-installing the "standard desktop software") over what existed acceptable?
 
Kenneth Dildy
Information Technology Security Officer
Pitt County Memorial Hospital
PO Box 6028
Greenville, NC 27835-6028
[EMAIL PROTECTED]

>>> "Doug Webb" <[EMAIL PROTECTED]> 10/28/03 09:09AM >>>
Mimi,
Quite correct. Most of the anti-virus vendors out there have one or more products out there that will overwrite a hard or floppy disk (and, if you tell it to, with enough different patterns to keep even the CIA happy).
Peter Norton had one of these on the market soon after the first MS-DOS PCs were on the market (before Bill Gates made his first Billion).  They still market a descendant of that program.
 
The opinions expressed here are my own and not necessarily the opinion of LCMH.
 
Douglas M. Webb
Computer System Engineer
Little Company of Mary Hospital & Health Care Centers
[EMAIL PROTECTED]
 
"This electronic message may contain information that is confidential and/or legally privileged. It is intended only for the use of the individual(s) and entity(s)  named as recipients in the message. If you are not an intended recipient of the message, please notify the sender immediately,  delete the material from any computer, do not deliver, distribute, or copy this message, and do not disclose its contents or take action in reliance on the information it contains. Thank you."
 

 
----- Original Message -----
From: Mimi Hart
Sent: Monday, October 27, 2003 04:13 PM
Subject: Re: Disposal of Electronic Media

Time to play devil's advocate here...

Where in the regs does it say "older computers" running Windows 95 and
98 are verbotten?

Where is the dividing line? 2000? XP? What about other
systems....Linux?

Or is it the settings, products, policies  and processes we put in
place around/in the computers that make our organization compliant?

As for destroying a computer to destroy PHI....there is more then
enough of that kind of waste in the landfills as far as I am
concerned...

I am sure there are products that can be purchased at the local Best
Buy, etc that will clean a computer in a "reasonable and appropriate"
manner, which is what is called for...

My opinion only....Mimi


Mimi Hart Ó¿Õ*
Research Analyst, HIPAA
Iowa Health System
319-739-2430 (phone)
319-739-2594 (fax)
319-490-0637 (pager)
[EMAIL PROTECTED]
        *********************************************

This message and accompanying documents are covered by the Electronic Communications Privacy Act, 18 U.S.C. §§ 2510-2521, and contain information intended for the specified individual(s) only. This information is confidential. If you are not the intended recipient or an agent responsible for delivering it to the intended recipient, you are hereby notified that you have received this document in error and that any review, dissemination, copying, or the taking of any action based on the contents of this information is strictly prohibited. If you have received this communication in error, please notify us immediately by e-mail, and delete the original message.

        *********************************************


---
The WEDI SNIP listserv to which you are subscribed is not moderated. The discussions on this listserv therefore represent the views of the individual participants, and do not necessarily represent the views of the WEDI Board of Directors nor WEDI SNIP. If you wish to receive an official opinion, post your question to the WEDI SNIP Issues Database at http://snip.wedi.org/tracking/.   These listservs should not be used for commercial marketing purposes or discussion of specific vendor products and services.  They also are not intended to be used as a forum for personal disagreements or unprofessional communication at any time.

You are currently subscribed to wedi-security as: [EMAIL PROTECTED]
To unsubscribe from this list, go to the Subscribe/Unsubscribe form at http://subscribe.wedi.org or send a blank email to [EMAIL PROTECTED]
If you need to unsubscribe but your current email address is not the same as the address subscribed to the list, please use the Subscribe/Unsubscribe form at http://subscribe.wedi.org
---
The WEDI SNIP listserv to which you are subscribed is not moderated. The discussions on this listserv therefore represent the views of the individual participants, and do not necessarily represent the views of the WEDI Board of Directors nor WEDI SNIP. If you wish to receive an official opinion, post your question to the WEDI SNIP Issues Database at http://snip.wedi.org/tracking/. These listservs should not be used for commercial marketing purposes or discussion of specific vendor products and services. They also are not intended to be used as a forum for personal disagreements or unprofessional communication at any time.

You are currently subscribed to wedi-security as: [EMAIL PROTECTED]
To unsubscribe from this list, go to the Subscribe/Unsubscribe form at http://subscribe.wedi.org or send a blank email to [EMAIL PROTECTED]
If you need to unsubscribe but your current email address is not the same as the address subscribed to the list, please use the Subscribe/Unsubscribe form at http://subscribe.wedi.org
---
The WEDI SNIP listserv to which you are subscribed is not moderated. The discussions on this listserv therefore represent the views of the individual participants, and do not necessarily represent the views of the WEDI Board of Directors nor WEDI SNIP. If you wish to receive an official opinion, post your question to the WEDI SNIP Issues Database at http://snip.wedi.org/tracking/. These listservs should not be used for commercial marketing purposes or discussion of specific vendor products and services. They also are not intended to be used as a forum for personal disagreements or unprofessional communication at any time.

You are currently subscribed to wedi-security as: [EMAIL PROTECTED]
To unsubscribe from this list, go to the Subscribe/Unsubscribe form at http://subscribe.wedi.org or send a blank email to [EMAIL PROTECTED]
If you need to unsubscribe but your current email address is not the same as the address subscribed to the list, please use the Subscribe/Unsubscribe form at http://subscribe.wedi.org


The contents of this e-mail (and any attachments) are confidential, may be privileged and may contain copyright material. You may only reproduce or distribute material if you are expressly authorized by us to do so. If you are not the intended recipient, any use, disclosure or copying of this email (and any attachments) is unauthorized. If you have received this e-mail in error, please notify the sender and immediately delete this e-mail and any copies of it from your system.

Reply via email to