Purse or wallet lost, stolen or missingTag: Confidential information
If your wallet or purse is stolen or if you left it somewhere and now it’s gone, there are several steps you should take to make sure your information is safe and secure.
Determining Whether There is a Data Breach ChecklistTag: Personal information (PI)
Breaches are becoming more common because of the collection and storage of mass amounts of data.
Classifying DataTag: Public data
Under State Technology Policy 141.10, Agencies must classify data into categories based on the sensitivity of the data. This checklist helps Agencies determine what type of data they are collecting and the proper handling of that data.
The Office of Privacy and Data Protection is also the sponsor for “Privacy Modeling,” a web application that identifies the privacy laws relevant to the product or service you wish to create.