The State of California Labor and Workforce Development Agency (LWDA) is committed to protecting the privacy rights of individuals. It is our policy to limit the collection of personal information and protect the personal information it collects and maintains.
The personal information collection and management policies, practices and procedures implemented by LWDA are governed by law, including the Information Practices Act of 1977 (Title 1.8 [commencing with Section 1798] of Part 4 of Division 3 of the Civil Code), the Public Records Act (Government Code Section 6250 et seq.), Government Code Sections 11015.5 and 11019.9, and Sections 1094 and 1095 of the California Unemployment Insurance Code.
LWDA identifies the purposes for which personal information is collected at or before the time the information is collected. Personal information will not be disclosed, made available, or otherwise used for purposes other than those specified at the time of collection, except with the consent of the subject of the data, or as authorized by law.
LWDA does not collect home, business or e-mail addresses, or account information from persons who simply browse our Internet website. The information LWDA automatically collects includes your domain name or Internet Protocol (IP) address, the type of browser and operating system you used, date and time you visited the site, Web pages you visited and any forms you downloaded or submitted. This information is collected for customer service and audit purposes and is deleted after 30 days. Electronically collected information is exempt from requests made under the Public Records Act.
LWDA will not distribute or sell any electronically collected personal information about users to any third party without the user’s written consent.
LWDA secures all personal information against loss, damage, modification, unauthorized access, or disclosure as required by federal and California Law, and the State Administrative Manual policy. Information voluntarily provided by you will be protected by the appropriate computer, network, and Internet technical security controls at the employee and departmental level to prevent unauthorized access. Some of these security controls include password and user identification verification, data encryption, confidential transmissions, secure storage areas, and audit trails.
Individuals have a right to access information about themselves and may request a correction of any inaccuracies. You have the right to have your electronically collected personal information discarded without reuse or distribution.
Effective Date: July 7, 2015