End of Life - Vintage https://yourvintage.org Your connection to information, resources, and advocacy for older adults.. Wed, 18 May 2022 15:49:20 +0000 en-US hourly 1 https://wordpress.org/?v=6.6.2 https://yourvintage.org/wp-content/uploads/2020/01/V_icon@500-150x150.png End of Life - Vintage https://yourvintage.org 32 32 Data Privacy Day: Awareness & Protection https://yourvintage.org/data-privacy-day-awareness-protection/?utm_source=rss&utm_medium=rss&utm_campaign=data-privacy-day-awareness-protection Thu, 16 Dec 2021 04:41:52 +0000 https://yourvintage.org/?p=1606 In honor of Data Privacy Day, learn more about data privacy, how data gets collected and what to do to protect yourself.

The post Data Privacy Day: Awareness & Protection first appeared on Vintage.

]]>

Data Privacy Day: Awareness & Protection

Did you know?

  • Every 2 seconds there is a new victim of identity theft.
  • Data breaches exposed 36 billion records in the first half of 2020 alone

How does it get collected?

There are tons of obscure ways your personal information is shared or available online such as obituaries which often include lists of the names and locations of all relatives.

Other ways are through newspaper articles or letters to the editor, and meeting minutes from public hearings.
It can even be shared through personal reviews of products/shops.

Less obscure ways are through social media, online shopping, breaches in credit information and more.

9 Ways to Protect Yourself from Data Exposure:

  1. Change your passwords. When your account is breached, make sure to change all your passwords that are the same as the breached account. Trust us; it’s worth it!
  2.  Invest in a password protector or write down your passwords. Please write down your passwords in a notebook and store them safely or invest in an encrypted password protector.
  3. Watch your bank statements. Check your bank statements regularly for fraudulent charges and report them as soon as possible!
  4. File your taxes early. One common scam is for identity thieves to file a tax return in your name to get a refund, so make sure you get your return in before they can. Also, don’t believe anyone who says they’re calling from the IRS!
  5. Set up a fraud alert with your bank. In case you can’t regularly check your bank statements, set up a fraud alert, so you are notified of any irregular charges on your account.
  6. Never use your debit card online. Only use credit cards on the Internet to ensure you get your money back, if your account is hacked.
  7. Use sentences rather than passwords. The longer your password is, the harder it is to hack. Also, write a sentence that is not related to you in any way! Don’t use your birthday as a password as well.
  8. Be careful on public Wi-Fi. If you’re using the Internet through a public Wi-Fi connection that doesn’t require a password (like one at a coffee shop or store), you’re probably using an unencrypted network. This makes it possible for someone to see the websites you visit and even the information you type into specific forms, including credit card numbers.
  9. When in doubt, throw it out. Links in email, social media posts, and online advertising are often how cybercriminals try to steal your personal information. So even if you know the source, if something looks suspicious, delete it.

Red Flags of Data Privacy: Things to lookout For

  • Urgent Emails or Messages: If it requires you to respond in a crisis,
    the message is likely spam.
  • Grandchild Scams: Beware of criminals who pose as grandchildren and ask for financial assistance.
  • Government Scams: Watch out if anyone calls or emails asking for your tax information.
  • Pirating sites: Downloading (or torrenting) music, movies, and TV
    shows for free is tempting, but itʼs best not to use torrent websites.
  • Romance Scams: Watch out for people who pose as interested romantic partners on dating websites or social media, and ask you for money.

Be safe online! The FTC reported that 35% of fraud complaints and 18.9% of identity theft complaints in 2017 were from older adults. Ask for help if you see
something suspicious!

How to Create a Plan for Your Digital Assets

Consider what you want to happen with your digital legacy when creating your estate plan.

You have probably used the Internet and created an online presence throughout your life. For example, you may have an email account and social media sites to keep up with loved ones. Or you may contribute to a blog or sell items on Amazon or eBay.

Regardless of where you interact online, it’s essential to consider your digital assets when creating your estate plan. Ultimately, estate planning instruments do not allow you to transfer ownership in online accounts or other forms of digital presence to your heirs. Instead, you hold these accounts only by a license, based on your contract with the company that offers the accounts.

However, online accounts still can feature in your end-of-life decisions because access will significantly ease the process of terminating your accounts. The first step is to identify the accounts you need to add to your will.

Consider:
1. social networks, such as Facebook, Twitter, or LinkedIn
2. blogs and licensed domain names
3. your presence in online communities or listserves
4. music, photos, or other files that you store online
5. seller’s accounts on Amazon, eBay, or Itsy, and
6. access to financial accounts or utilities

Next, leave instructions for your executor about what to do with (and how to access) your online accounts.

The easiest way to do this is to write your instructions and log-in information in a letter and store the letter with your other estate planning documents — this way, your executor does not need to petition companies directly for access.

Did you know?

  • Every 2 seconds there is a new victim of identity theft.
  • Data breaches exposed 36 billion records in the first half of 2020 alone

[/vc_column_text]

How does it get collected?

There are tons of obscure ways your personal information is shared or available online such as obituaries which often include lists of the names and locations of all relatives.

Other ways are through newspaper articles or letters to the editor, and meeting minutes from public hearings.
It can even be shared through personal reviews of products/shops.

Less obscure ways are through social media, online shopping, breaches in credit information and more.

9 Ways to Protect Yourself from Data Exposure:

  1. Change your passwords. When your account is breached, make sure to change all your passwords that are the same as the breached account. Trust us; it’s worth it!
  2.  Invest in a password protector or write down your passwords. Please write down your passwords in a notebook and store them safely or invest in an encrypted password protector.
  3. Watch your bank statements. Check your bank statements regularly for fraudulent charges and report them as soon as possible!
  4. File your taxes early. One common scam is for identity thieves to file a tax return in your name to get a refund, so make sure you get your return in before they can. Also, don’t believe anyone who says they’re calling from the IRS!
  5. Set up a fraud alert with your bank. In case you can’t regularly check your bank statements, set up a fraud alert, so you are notified of any irregular charges on your account.
  6. Never use your debit card online. Only use credit cards on the Internet to ensure you get your money back, if your account is hacked.
  7. Use sentences rather than passwords. The longer your password is, the harder it is to hack. Also, write a sentence that is not related to you in any way! Don’t use your birthday as a password as well.
  8. Be careful on public Wi-Fi. If you’re using the Internet through a public Wi-Fi connection that doesn’t require a password (like one at a coffee shop or store), you’re probably using an unencrypted network. This makes it possible for someone to see the websites you visit and even the information you type into specific forms, including credit card numbers.
  9. When in doubt, throw it out. Links in email, social media posts, and online advertising are often how cybercriminals try to steal your personal information. So even if you know the source, if something looks suspicious, delete it.

Red Flags of Data Privacy: Things to lookout For

  • Urgent Emails or Messages: If it requires you to respond in a crisis,
    the message is likely spam.
  • Grandchild Scams: Beware of criminals who pose as grandchildren and ask for financial assistance.
  • Government Scams: Watch out if anyone calls or emails asking for your tax information.
  • Pirating sites: Downloading (or torrenting) music, movies, and TV
    shows for free is tempting, but itʼs best not to use torrent websites.
  • Romance Scams: Watch out for people who pose as interested romantic partners on dating websites or social media, and ask you for money.

Be safe online! The FTC reported that 35% of fraud complaints and 18.9% of identity theft complaints in 2017 were from older adults. Ask for help if you see
something suspicious!

How to Create a Plan for Your Digital Assets

Consider what you want to happen with your digital legacy when creating your estate plan.

You have probably used the Internet and created an online presence throughout your life. For example, you may have an email account and social media sites to keep up with loved ones. Or you may contribute to a blog or sell items on Amazon or eBay.

Regardless of where you interact online, it’s essential to consider your digital assets when creating your estate plan. Ultimately, estate planning instruments do not allow you to transfer ownership in online accounts or other forms of digital presence to your heirs. Instead, you hold these accounts only by a license, based on your contract with the company that offers the accounts.

However, online accounts still can feature in your end-of-life decisions because access will significantly ease the process of terminating your accounts. The first step is to identify the accounts you need to add to your will.

Consider:
1. social networks, such as Facebook, Twitter, or LinkedIn
2. blogs and licensed domain names
3. your presence in online communities or listserves
4. music, photos, or other files that you store online
5. seller’s accounts on Amazon, eBay, or Itsy, and
6. access to financial accounts or utilities

Next, leave instructions for your executor about what to do with (and how to access) your online accounts.

The easiest way to do this is to write your instructions and log-in information in a letter and store the letter with your other estate planning documents — this way, your executor does not need to petition companies directly for access.

[/vc_column]
[/vc_row]

Data privacy, or information privacy, involves the protection of data with regard to its collection, usage, and distribution. “Data” in the case of data privacy typically refers to any information that could personally identify someone, such as their name, address, phone number, social security number, credit card information, or their username and password, among other things.

Did you know?

  • Every 2 seconds there is a new victim of identity theft.
  • Data breaches exposed 36 billion records in the first half of 2020 alone

[/vc_column_text]

How does it get collected?

There are tons of obscure ways your personal information is shared or available online such as obituaries which often include lists of the names and locations of all relatives.

Other ways are through newspaper articles or letters to the editor, and meeting minutes from public hearings.
It can even be shared through personal reviews of products/shops.

Less obscure ways are through social media, online shopping, breaches in credit information and more.

9 Ways to Protect Yourself from Data Exposure:

  1. Change your passwords. When your account is breached, make sure to change all your passwords that are the same as the breached account. Trust us; it’s worth it!
  2.  Invest in a password protector or write down your passwords. Please write down your passwords in a notebook and store them safely or invest in an encrypted password protector.
  3. Watch your bank statements. Check your bank statements regularly for fraudulent charges and report them as soon as possible!
  4. File your taxes early. One common scam is for identity thieves to file a tax return in your name to get a refund, so make sure you get your return in before they can. Also, don’t believe anyone who says they’re calling from the IRS!
  5. Set up a fraud alert with your bank. In case you can’t regularly check your bank statements, set up a fraud alert, so you are notified of any irregular charges on your account.
  6. Never use your debit card online. Only use credit cards on the Internet to ensure you get your money back, if your account is hacked.
  7. Use sentences rather than passwords. The longer your password is, the harder it is to hack. Also, write a sentence that is not related to you in any way! Don’t use your birthday as a password as well.
  8. Be careful on public Wi-Fi. If you’re using the Internet through a public Wi-Fi connection that doesn’t require a password (like one at a coffee shop or store), you’re probably using an unencrypted network. This makes it possible for someone to see the websites you visit and even the information you type into specific forms, including credit card numbers.
  9. When in doubt, throw it out. Links in email, social media posts, and online advertising are often how cybercriminals try to steal your personal information. So even if you know the source, if something looks suspicious, delete it.

Red Flags of Data Privacy: Things to lookout For

  • Urgent Emails or Messages: If it requires you to respond in a crisis,
    the message is likely spam.
  • Grandchild Scams: Beware of criminals who pose as grandchildren and ask for financial assistance.
  • Government Scams: Watch out if anyone calls or emails asking for your tax information.
  • Pirating sites: Downloading (or torrenting) music, movies, and TV
    shows for free is tempting, but itʼs best not to use torrent websites.
  • Romance Scams: Watch out for people who pose as interested romantic partners on dating websites or social media, and ask you for money.

Be safe online! The FTC reported that 35% of fraud complaints and 18.9% of identity theft complaints in 2017 were from older adults. Ask for help if you see
something suspicious!

How to Create a Plan for Your Digital Assets

Consider what you want to happen with your digital legacy when creating your estate plan.

You have probably used the Internet and created an online presence throughout your life. For example, you may have an email account and social media sites to keep up with loved ones. Or you may contribute to a blog or sell items on Amazon or eBay.

Regardless of where you interact online, it’s essential to consider your digital assets when creating your estate plan. Ultimately, estate planning instruments do not allow you to transfer ownership in online accounts or other forms of digital presence to your heirs. Instead, you hold these accounts only by a license, based on your contract with the company that offers the accounts.

However, online accounts still can feature in your end-of-life decisions because access will significantly ease the process of terminating your accounts. The first step is to identify the accounts you need to add to your will.

Consider:
1. social networks, such as Facebook, Twitter, or LinkedIn
2. blogs and licensed domain names
3. your presence in online communities or listserves
4. music, photos, or other files that you store online
5. seller’s accounts on Amazon, eBay, or Itsy, and
6. access to financial accounts or utilities

Next, leave instructions for your executor about what to do with (and how to access) your online accounts.

The easiest way to do this is to write your instructions and log-in information in a letter and store the letter with your other estate planning documents — this way, your executor does not need to petition companies directly for access.

[/vc_column]
[/vc_row]

In honor of Data Privacy Day on January 28th, learn more about data privacy, how data gets collected and what to do to protect yourself

What is Data Privacy?

Data privacy, or information privacy, involves the protection of data with regard to its collection, usage, and distribution. “Data” in the case of data privacy typically refers to any information that could personally identify someone, such as their name, address, phone number, social security number, credit card information, or their username and password, among other things.

Did you know?

  • Every 2 seconds there is a new victim of identity theft.
  • Data breaches exposed 36 billion records in the first half of 2020 alone

[/vc_column_text]

How does it get collected?

There are tons of obscure ways your personal information is shared or available online such as obituaries which often include lists of the names and locations of all relatives.

Other ways are through newspaper articles or letters to the editor, and meeting minutes from public hearings.
It can even be shared through personal reviews of products/shops.

Less obscure ways are through social media, online shopping, breaches in credit information and more.

9 Ways to Protect Yourself from Data Exposure:

  1. Change your passwords. When your account is breached, make sure to change all your passwords that are the same as the breached account. Trust us; it’s worth it!
  2.  Invest in a password protector or write down your passwords. Please write down your passwords in a notebook and store them safely or invest in an encrypted password protector.
  3. Watch your bank statements. Check your bank statements regularly for fraudulent charges and report them as soon as possible!
  4. File your taxes early. One common scam is for identity thieves to file a tax return in your name to get a refund, so make sure you get your return in before they can. Also, don’t believe anyone who says they’re calling from the IRS!
  5. Set up a fraud alert with your bank. In case you can’t regularly check your bank statements, set up a fraud alert, so you are notified of any irregular charges on your account.
  6. Never use your debit card online. Only use credit cards on the Internet to ensure you get your money back, if your account is hacked.
  7. Use sentences rather than passwords. The longer your password is, the harder it is to hack. Also, write a sentence that is not related to you in any way! Don’t use your birthday as a password as well.
  8. Be careful on public Wi-Fi. If you’re using the Internet through a public Wi-Fi connection that doesn’t require a password (like one at a coffee shop or store), you’re probably using an unencrypted network. This makes it possible for someone to see the websites you visit and even the information you type into specific forms, including credit card numbers.
  9. When in doubt, throw it out. Links in email, social media posts, and online advertising are often how cybercriminals try to steal your personal information. So even if you know the source, if something looks suspicious, delete it.

Red Flags of Data Privacy: Things to lookout For

  • Urgent Emails or Messages: If it requires you to respond in a crisis,
    the message is likely spam.
  • Grandchild Scams: Beware of criminals who pose as grandchildren and ask for financial assistance.
  • Government Scams: Watch out if anyone calls or emails asking for your tax information.
  • Pirating sites: Downloading (or torrenting) music, movies, and TV
    shows for free is tempting, but itʼs best not to use torrent websites.
  • Romance Scams: Watch out for people who pose as interested romantic partners on dating websites or social media, and ask you for money.

Be safe online! The FTC reported that 35% of fraud complaints and 18.9% of identity theft complaints in 2017 were from older adults. Ask for help if you see
something suspicious!

How to Create a Plan for Your Digital Assets

Consider what you want to happen with your digital legacy when creating your estate plan.

You have probably used the Internet and created an online presence throughout your life. For example, you may have an email account and social media sites to keep up with loved ones. Or you may contribute to a blog or sell items on Amazon or eBay.

Regardless of where you interact online, it’s essential to consider your digital assets when creating your estate plan. Ultimately, estate planning instruments do not allow you to transfer ownership in online accounts or other forms of digital presence to your heirs. Instead, you hold these accounts only by a license, based on your contract with the company that offers the accounts.

However, online accounts still can feature in your end-of-life decisions because access will significantly ease the process of terminating your accounts. The first step is to identify the accounts you need to add to your will.

Consider:
1. social networks, such as Facebook, Twitter, or LinkedIn
2. blogs and licensed domain names
3. your presence in online communities or listserves
4. music, photos, or other files that you store online
5. seller’s accounts on Amazon, eBay, or Itsy, and
6. access to financial accounts or utilities

Next, leave instructions for your executor about what to do with (and how to access) your online accounts.

The easiest way to do this is to write your instructions and log-in information in a letter and store the letter with your other estate planning documents — this way, your executor does not need to petition companies directly for access.

[/vc_column]
[/vc_row]

The post Data Privacy Day: Awareness & Protection first appeared on Vintage.

]]>
How to Create an Advance Directive in Colorado During COVID https://yourvintage.org/how-to-create-an-advance-directive-in-colorado-during-covid/?utm_source=rss&utm_medium=rss&utm_campaign=how-to-create-an-advance-directive-in-colorado-during-covid Mon, 30 Nov 2020 02:24:00 +0000 https://yourvintage.org/?p=1180 Advance Directives in Colorado are imperative documents, also called a living will, that let your medical team know how you would like to be treated in medical situations. Learn more here!

The post How to Create an Advance Directive in Colorado During COVID first appeared on Vintage.

]]>
HOW TO CREATE AN ADVANCE DIRECTIVE IN COLORADO DURING COVID-19

Let’s talk about creating an advance directive in Colorado during COVID-19.

How to have family conversations

Advance Directives in Colorado are imperative documents, also called a living will, that let your medical team know how you would like to be treated in medical situations. They also state personal wishes for end-of-life health preferences.

As of today, 1 in 49 Coloradoans has been diagnosed with COVID-19. And one-third of Coloradoans are 65 or older. That means that more than ever, it is important to stay home and social distance, AND prepare your advance directive with a COVID clause if you are 65+.

Let’s walk through the basics of advance directives and COVID-19, and we will share how to change your advance directive in Colorado with your family and well being in mind. 

What is an advance directive?

According to UC Health, “Also known as a living will, an advance directive is a legal document that lets your healthcare team know your preferences for the medical care you would want to receive in the future.”

It’s good to note that an Advance Directive is not the same as a financial will.

Also, no lawyer is needed to complete your advance directive – all that is required for it to be legal is your signature and two witnesses’ signatures.

How does COVID change my advance directive?

COVID-19 has changed our world in previously unimaginable ways in 2020. From social distancing and not seeing loved ones to the looming stress of potential respiratory illness, COVID-19 arriving has marked a large shift in the healthcare field (and the world).

What are Common Care Treatments for COVID-19

COVID-19 treatments range with the severity of the situation. They can be as simple as staying home with flu-like symptoms to full ICU treatment. OF course, we can all hope we will be lucky enough only to show flu-like symptoms, or solely lose our taste and smell if diagnosed with COVID-19, but that may not be the case, so it’s good to know the next steps.

General care for COVID-19 that is non-emergent but still necessitates a hospital stay includes antiviral drugs, anti-inflammatory medications, and antibodies.

ICU treatment occurs if the patient is seriously ill and is usually lung related due to COVID-19 attacking lung functionality. ICU interventions may include a breathing tube and mechanical ventilator. It’s noted that these interventions supply seven times the volume of the oxygen we get from breathing normally.

In this case, it’s best to consider your feelings about receiving a breathing tube and ventilator. Also, it’s time to consider other extraordinary measures, such as cardiopulmonary resuscitation (CPR).

This is where a cardiopulmonary resuscitation (CPR) directive comes into play. A CPR is another part of your advance directive and is a medical order, and it instructs providers not to resuscitate if a person’s heart or breathing stops.

This type of advance directive generally applies to the seriously ill and should be discussed at length with your loved ones. Then you and your doctor must sign this form.

The National Institute on Aging recommends that all adults have at least a medical durable power of attorney in place in a CPR directive.

How should I change my advance directive?

We suggest adding a COVID-19 addendum. This special addendum will mark the specific kind of care you want if you contract COVID-19 and are hospitalized.

Questions to consider are:

  • If your oxygen levels are dropping, do you want to go to the hospital, or would you prefer to get noninvasive respiratory care at home? 
  • If you cannot receive noninvasive respiratory care at home, do you want to go to the hospital? 
  • If the care available to you at home can keep you comfortable but cannot save your life, is your preference to stay at home? Or do you want to go to the hospital? 
  • When you get to the hospital, do you want healthcare providers to only treat you with noninvasive options that could save your life (such as oxygen through a face mask or nasal mask)? Do you want them to do anything necessary to keep you comfortable and control your symptoms? Or do you want to be put on a ventilator if that becomes necessary to save your life? 
  • If your heart stops, do you want to be resuscitated via CPR?
  • If you would like to be ventilated, are there any guidelines around how long you want to stay on the ventilator? Is there a length of time that you wish to remain on the ventilator? Days? Weeks? Months
  • Do you want your healthcare proxy to have the ability to override any of these orders if he or she believes you have a reasonable chance of living a life consistent with your values and priorities based on the information provided by the doctor? Or, do you want these orders followed no matter what?
  • Do you want to be kept out of physical pain with the help of opioids, or would you like to opt-out?
  • Do you want any tests whose results would be meaningless, given the potential desire to avoid treatments that might be burdensome, agitating, painful, or prolonging your life or death?

These are just some of the questions we think are important to consider when thinking about a COVID-19 advance care directive and addendum.

Who can help me with my advance directive in Colorado?

How do I talk to my family about my advance directive and COVID-19?

As always, we encourage talking to your loved ones openly and calmly about your needs and wishes. Here at Vintage, we offer our Ombudsman services to guide you through moments like these. You can find resources by contacting the Long-Term Care Ombudsman for Region 12 at 970-513-2980 or tstrang@nwccog.org

The post How to Create an Advance Directive in Colorado During COVID first appeared on Vintage.

]]>