WV Bureau of Senior Services

Privacy Tips and Updates

Security Safeguards
October is National Cyber Security Awareness Month—Tip 2: Protect Your Personal Information   October 8, 2014
October is National Cyber Security Awareness Month—Tip 1: Keep a Clean Machine   October 1, 2014
Mobile Device Security: Basic Tips to Protect Your Data from Cybercriminals   August 27, 2014
Identity Theft—Guard Your Numbers!   June 18, 2014
Tax Time Tips—April 15 is Upon Us!   April 2, 2014
Tax Time Tips   February 5, 2014
Data Privacy DayJanuary 28, 2014   January 22, 2014
Keep a Clean Machine   January 6, 2014
Health and Fitness Apps: What are the Privacy Risks?   December 12, 2013
Top Tips for Safe Online Holiday Shopping   November 27, 2013
Email Tips   November 13, 2013
Be Web Wise   October 1, 2013
What is Privacy?   September 18, 2013
Managing Privacy Effectively   September 4, 2013
The Dreaded Shredder   May 15, 2013
Tax Time Identity Safety Tips - Part 3   March 27, 2013
Tax Time Identity Safety Tips - Part 2   March 13, 2013
Tax Time Identity Safety Tips - Part 1   February 27, 2013
Criminals Disguised as Cupid for Valentine's Day   February 12, 2013
Happy New Year—Creating a Strong Password   January 16, 2013
Holiday Shopping Tips - Part 4   December 18, 2012
Holiday Shopping Tips - Part 3   December 11, 2012
Holiday Shopping Tips - Part 2   December 4, 2012
Holiday Shopping Tips - Part 1   November 29, 2012
Thanksgiving Shopping Tips   November 20, 2012
Snail Mail Scams   November 13, 2012
Webcam Invasion   November 5, 2012
Cyber Security Month - Part 5   October 29, 2012
Cyber Security Month - Part 4   October 22, 2012
Cyber Security Month - Part 3   October 16, 2012
Cyber Security Month - Part 2   October 10, 2012
Cyber Security Month - Part 1   October 5, 2012
Lock It Up!   September 7, 2012
Lost in Translation   August 13, 2012
Summer Vacation Tips   June 5, 2012
Social Networking - Tip #2   May 30, 2012
Social Networking - Tip #1   May 22, 2012
Tax Time Identity Safety – Part 3   April 12, 2012
Password Protected?   March 27, 2012
Smartphone Security   March 13, 2012
Free Stuff Scam   February 2, 2012
Clean Desk, Clean Computer (Data Privacy Day)   January 25, 2012
Mystery Shopper   January 6, 2012
All I Want for Christmas   December 19, 2011
Holiday Giving (and Taking!)   December 13, 2011
Spyware, Malware, Adware and Other Naughty Programs   December 6, 2011
Identity Theft—Deter, Detect, Defend   November 30, 2011
What Can I Do? (Part 2)   November 14, 2011
What Can I Do? (Part 1)   November 7, 2011
It's Not My Job...Is It?   September 26, 2011
Summer Vacation Tips   July 26, 2011
Changing Your Password   May 23, 2011
Social Engineering   May 9, 2011
Understanding Phishing and Spear Phishing Threats   May 4, 2011
Social Engineering—Meet Jim Rockford   November 17, 2010
Minimizing Mistakes   September 7, 2010
Managing Vendors   August 30, 2010
Learn from Other People's Mistakes   August 23, 2010
Fact or Fiction?   July 6, 2010
Debunking Some Common Security Myths   June 22, 2010
Cell Phones, Smart Phones and Other Personal Devices   June 7, 2010
Social Engineering   June 1, 2010
Tons of PII   May 24, 2010
Make a Difference in Just 15 Minutes a Month   May 3, 2010
Spring Cleaning—Any Time of the Year!   February 8, 2010
How Safe Are You?   January 25, 2010
Information Security Resources   January 11, 2010
Handling Sensitive PI   January 4, 2010
Storing PI on Portable Devices   December 28, 2009
Security Concerns When Transmitting PI   December 21, 2009
Security Starts with a Strong Password   December 14, 2009
Know the Information Security Rules   December 7, 2009

Consent
Consent Policy—Opt In or Opt Out?   May 28, 2014
Consent Policy—What Does It Mean?   April 30, 2014
Pre-Recorded Telephone Calls   October 18, 2010
Fighting Spam   May 19, 2011
Recording Consents   November 30, 2009
When Consent isn't All or Nothing   November 23, 2009
When Consent is Not Required   November 16, 2009
Consent for New Uses of PI   November 9, 2009
Consent for Marketing Communications   November 2, 2009
Opt-Ins and Opt-Outs   October 26, 2009
When Consent is Legally Required   October 19, 2009
Managing Individual Objections to the Collection or Use of PI   October 12, 2009
Understanding the Consent Policy   October 5, 2009

Minimum Necessary and Limited Use
Minimum Necessary—Enough is Enough!   August 13, 2014
Redacting Personally Identifiable Information (PII)   April 24, 2012
Limited Data and Direct Identifiers   February 22, 2012
Limited Data Sets   August 16, 2011
Handling Objections to Personal Information Collection Requests   April 11, 2011
Obtaining Personal Information (PI) from Third Parties   September 28, 2009
Asking for More Than the Minimum Necessary—WHEN and HOW You Can!   September 21, 2009
Handling Objections to Personal Information Collection Requests   September 14, 2009
Sharing the "Minimum Necessary"   August 31, 2009
Sharing Personal Information with Vendors   August 24, 2009
Sharing Personal Information with Other Government Agencies   August 17, 2009
Understanding the Minimum Necessary and Limited Use Policy   August 3, 2009

Individual Rights
Individual Rights Policy—Access and Correction of PII   July 2, 2014
Privacy in the Workplace   June 7, 2011
Accuracy of PII   October 13, 2010
Accessing Your Consumer Credit Report   April 26, 2010
Accuracy of Third Party Data Sources   July 27, 2009
Accuracy of Personal Information   July 20, 2009
Correcting Personal Information   July 6, 2009
Accessing Your Own Personal Information   June 29, 2009
FOIA vs. Individual Rights   June 22, 2009
Limits on Individual Access Rights   June 15, 2009
Individual Rights of Access are Guaranteed by Many Laws   June 8, 2009
Understanding the Individual Rights Policy   June 1, 2009

Notice
Notice: to Give or Not to Give   September 24, 2014
Understanding the Notice Policy   September 10, 2014
Be Kind, Give Notice   September 24, 2012
Privacy Notice Audits   September 12, 2011
Websites that Collect PII from Children   September 27, 2010
Why We Give Privacy Notices   May 25, 2009
Using Layered Privacy Notices   April 27, 2009
Privacy Notice Considerations   April 20, 2009
Delivering Privacy Notices   April 13, 2009
Providing Privacy Notices   April 6, 2009

Accountability
Response to Unauthorized Disclosures Procedure   April 16, 2014
Accountability Policy—Employee Training   March 19, 2014
Incident Reporting   June 12, 2013
Missing Mail   May 1, 2013
We Are All Accountable   April 17, 2013
Making the Most of Your Privacy Training   March 5, 2012
Mistakes Happen   February 17, 2012
Senate Bill 340   October 25, 2011
Executive Branch Privacy Officers   August 29, 2011
Alphabet Soup   July 13, 2011
Pre-Texting   July 9, 2011
Privacy-Savvy Grown-Ups, Privacy-Savvy Kids   June 13, 2011
It's Really About Trust   October 25, 2010
Privacy Defined   October 4, 2010
Identity Theft Red Flags   August 16, 2010
Free and Excellent Resources   June 14, 2010
Privacy and Security Breach Notification   April 6, 2010
Mistakes Happen—Responding to Privacy and Security Incidents   March 31, 2010
Handling Privacy Questions and Complaints   March 23, 2010
Managing Privacy Policy Violations   March 15, 2010
Understanding Your Confidentiality Agreement   March 9, 2010
Everyone is Responsible for Protecting Private Information (PI)   February 16, 2010
Accountability Tip No. 8: Privacy and Security Breach Notification   March 23, 2009
Accountability Tip No. 7: Mistakes Happen: Responding to Privacy and Security Incidents   March 16, 2009
Accountability Tip No. 6: Handling Privacy Questions and Complaints   March 9, 2009
Accountability Tip No. 4: Understanding Your Confidentiality Agreement   March 2, 2009
Accountability Tip No. 3: Privacy or Security Questions? Get Answers!   February 16, 2009
Accountability Tip No. 2: Making the Most of Your Privacy Training   February 9, 2009
Accountability Tips   February 2, 2009
Tip: New Website and Resources   November 10, 2008
Tip: Managing Privacy Effectively   November 3, 2008
Accountability Tip No. 1: Everyone is Responsible for Protecting PII   October 13, 2008

Privacy Tips
Department Privacy Officers—What Do They Do?   July 16, 2014
Privacy Principles   February 20, 2014
All I Want for Christmas   December 20, 2013
Privacy Policy Quiz   August 21, 2013
Quiz Yourself on Privacy Tips   June 26, 2013
Get to Know Your Privacy Officer
   September 11, 2012
Somebody to Lean On   August 27, 2012
Privacy Policy Quiz   July 16, 2012
National Email Week   June 11, 2012
Trick or Treat   October 31, 2011
Online Auctions   October 13, 2011
Privacy...Seriously?  August 24, 2011
Clean Desk 101   August 8, 2011
Phishing Attacks - Don't Be Fooled!   August 1, 2011
Unsolicited Commercial E-mail   July 21, 2011
Using Privacy Notices Internally   April 25, 2011
Individual Redress   April 18, 2011
Know the Information Security Rules   April 4, 2011
Accessing Your Own PI and Credit Report   March 21, 2011
E-mail Lives Forever   March 14, 2011
Consider the Risks of Using Social Networking Sites   March 8, 2011
How to Construct Good Passwords   February 28, 2011
Do You Suspect a Privacy Breach?   February 17, 2011
Protecting Mobile Devices   February 8, 2011
Do You Know Who's Listening In?   February 2, 2011
Protect Yourself Online   January 27, 2011
Requests for PII   January 24, 2011
You Are the Key to Security!   January 10, 2011
CAN-SPAM Act Considerations   January 3, 2011
Data Destruction   December 7, 2010
Business Continuity Planning (BCP)   November 9, 2010
Identity Theft – What to do it if Happens to You   November 4, 2010
Freedom of Information Act (FOIA)   January 12, 2009
HIPAA Privacy Rule   Received January 2, 2009
Security Breach or Data Breach   December 15, 2008
CAN-SPAM Act   December 8, 2008
West Virginia Governmental Ethics Act   December 1, 2008
Cell Phone Camera Use   November 24, 2008
Genetic Information Nondiscrimination Act of 2008 (GINA)   November 17, 2008
Personal Health Record   October 27, 2008
FTC Consumer Alert—Bank Failures, Mergers and Takeovers: A "Phish-erman's Special"   October 20, 2008
Cyber Security Tip ST05-015: Understanding Bluetooth Technology   Received October 6, 2008
Privacy Act of 1974   September 29, 2008
Types of Insurance Covered Under HIPAA   September 22, 2008
Difference Between HIPAA Privacy and HIPAA Security   September 15, 2008
Covered Entity Disclosure of Protected Health Information   September 8, 2008
Fighting Identity Theft   September 1, 2008