Five Steps to Building an ITAD Program

For most businesses, there’s a growing recognition that IT Asset Disposition (ITAD) isn’t just about managing e-waste. Organizations know that limiting data privacy risk, lowering Total Cost of Ownership (TCO), and ensuring sustainable business operations requires a complete lifecycle approach to managing hardware assets – including a set of well-documented and implemented policies and procedures. The fact is that record growth in PC and device demand, coupled with an increasingly distributed workforce, has raised the level of risk significantly.  Businesses are dealing with  increasing and rapidly-changing government regulations and industry standards aimed at ensuring data privacy and/or sustainability that have… Continue reading Five Steps to Building an ITAD Program

The HITECH Act – Recent Changes to HIPAA Data Privacy and Its Impact on You

By Brooks Hoffman, LifeSpan Technology Recycling ITAK V4 I10 Introduction: Among tax cuts and credits, more bailout fund requirements, and restrictions on executive pay packages, the American Recovery and Reinvestment Act of 2009 (ARRA) also includes a section that expands the reach of the Health Insurance Portability and Accountability Act (HIPAA) and introduces the first federally mandated data breach notification requirement. Title XIII of ARRA, also known as the Health Information Technology for Economic and Clinical Health Act (HITECH Act), reserves $22 billion to “advance the use of health information technology” — in large part so the U.S. will be… Continue reading The HITECH Act – Recent Changes to HIPAA Data Privacy and Its Impact on You

Red Flags Rule – Guidelines for Responding for Financial Institutions and Creditors

By Brooks Hoffman, LifeSpan Technology Recycling ITAK V4 I9 Summary: The Red Flags Rule was promulgated by the Federal Trade Commission and other federal agencies charged with overseeing compliance to the Financial Service Modernization Act (GLB), the Fair Credit Reporting Act (FCRA) and the Fair and Accurate Credit Transaction Act (FACTA).  It states that all Financial Institutions and others who are considered “Creditors” must: Identify in writing the areas of their operation where the personal information of their clients is at risk of unauthorized access; Develop written procedures to mitigate that risk; Detect unauthorized access if or when it happens.… Continue reading Red Flags Rule – Guidelines for Responding for Financial Institutions and Creditors