Policy and Program Guide

The Virginia Department of Social Services uses sensitive information, such as personal, financial and tax data daily to serve individuals and families across Virginia. Some of this information is sensitive. It includes personal and financial details. 

This policy explains how we protect that information and what is expected of anyone who uses VDSS systems or data. Keeping information safe helps protect people, maintain trust and ensure services continue without interruption. 

Our Guiding Principles 

We follow these core principles when protecting information: 

  • Information is a valuable resource and must be protected. 
  • Access is limited to people who need it to do their jobs. 
  • Information security supports both our work and our technology. 
  • Security decisions are based on risk and practicality. 
  • Policies guide the work, but leaders carry them out. 
  • Everyone shares responsibility for keeping information safe

Keeping information safe helps: 

  • Protect clients and employees 
  • Maintain public trust 
  • Ensure services remain available 

Information security is a shared responsibility.

Who Must Follow This Policy 

This policy applies to all individuals who use VDSS systems or information, including: 

  • Employees and supervisors 
  • Local department staff 
  • Contractors and subcontractors 
  • Volunteers and interns 
  • Business partners and vendors 

 Our Guiding Principles 

VDSS follows these core principles: 

Information is a valuable asset and must be protected 

  • Access is limited to people who need the information to do their job 
  • Security supports both daily work and technology 
  • Security decisions should be practical and risk-based 
  • Policies guide the work, but teams carry it out 
  • Everyone plays a role in protecting information 

 Your Responsibilities 

If you use VDSS systems or information, you are expected to: 

Follow Required Policies 

  • Following all VDSS security, privacy and acceptable use policies 
  • Completing required security and privacy training on time 
  • Protecting sensitive information you can access 
  • Keeping passwords private and secure 
  • Using encryption when sending or storing sensitive data 
  • Reporting security concerns right away 
  • Sign the Information Security Policy Acknowledgement and Non-Disclosure Agreement before receiving access.
  • Re-acknowledge this agreement each year as part of required training. 

You are not expected to fix problems on your own. Reporting concerns quickly helps limit harm and protect people. 

Complete Required Training

  • New employees must complete security and privacy training within 30 days.
  • All users must complete annual refresher training.
  • Training is based on job role and system access.

Protect Information

  • Use secure methods to store and send sensitive information.
  • Encrypt sensitive data when stored or shared.
  • Never share passwords or login information.
  • Protect paper files and printed records.
  • Keep private conversations private. Do not discuss sensitive cases where others can hear.

Speak Up When Something Goes Wrong

  • Report any suspected or actual security issue right away.
  • You are not expected to fix the problem yourself.
  • Reporting helps protect people and prevent further harm.

What Is Considered Sensitive Information

Sensitive information is any data that could cause harm if it is lost, shared or changed without permission.

This includes:

  • Personal information that can identify someone
  • Federal tax information
  • Confidential information from outside partners
  • Certain internal leadership documents

Sensitive information must always be handled with care to protect privacy and safety.

Personally Identifiable Information

Personally identifiable information includes details that can identify a person, such as:

  • Names and addresses
  • Phone numbers and email addresses
  • Social Security numbers
  • Bank account numbers
  • Birth dates and places
  • Biometric data

This information must be protected at all times.

Federal Tax Information 

Federal Tax Information has special Requirements. 

Key points to know: 

  • Access is limited: Only people with a job-related need may access this information. 
  • It must never be shared or stored without proper protection 
  • Information received directly from a client is not considered Federal Tax Information. 
  • Federal Tax Information must never be altered to bypass security rules. 
  • Systems that store this information are regularly tested for security 

Protection requirements continue even after employment ends. 

 Safeguards and Reviews 

Safeguards help protect taxpayers and maintain trust. 

VDSS regularly reviews how sensitive information is protected. 

These reviews: 

  • May be conducted on-site, remotely or a mix of both  
  • Focus on security controls, not individual or job performance 
  • Help ensure protections remain effective 

Reviews occur three-year cycle as needed to support improvement and accountability.  

 Reporting Security Incidents 

Report security concerns as soon as possible.  

This includes: 

  • Improper sharing of information 
  • Unauthorized access 
  • Lost or stolen devices 
  • Suspicious system activity 
  • Data spills or breaches 

What to do: 

  • Report the issue immediately using approved reporting channels 
  • Share only the necessary details 
  • Use secure methods when sending sensitive information 

Reporting quickly helps protect people and systems. 

Reporting Timelines 

  • Most incidents must be reported within 24 hours. 
  • Incidents involving certain data types may require faster reporting. 

Reports should include basic details and use encrypted methods when sharing sensitive information. 

Laws and Protections 

Several state and federal laws require VDSS to protect personal and tax information. 

Misuse of information can result in: 

  • Disciplinary action 
  • Fines or penalties 
  • Criminal charges in serious cases 

These laws continues to apply after you longer work at VDSS as they exist to protect individuals, not to create fear. 

 Compliance 

VDSS monitors compliance through reviews, audits and inspections. Systems or data may be removed if needed to protect information. 

VDSS checks compliance through: 

  • Reviews and audits 
  • Monitoring systems 
  • Evaluations and inspections 

Compliance helps ensure information stays protected and services continue. 

 Requesting an Exception 

In rare cases, following a policy may cause serious operational challenges. 

When this happens: 

  • A written request may be submitted 
  • The request must explain the reason and how risks will be managed 
  • Approval is required before any exception is used 
  • Denied requests may be appealed  

Exceptions are reviewed carefully to protect people and systems. 

Information security is about protecting people, not assigning blame. Asking questions, following guidance and reporting concerns help keep everyone safe. 

This guide helps everyone: 

  • Understand their role in protecting information 
  • Make safe, informed choices 
  • Report concerns without fear 
  • Support the mission of VDSS 

Security is not about blame. It is about care, awareness and shared responsibility. If you are unsure what to do, reach out. Contact VDSS.Security@dss.virginia.gov.