Info

headervet


Proposed HighGround Welcome Center flier.pdf

Click on flier for complete PDF. The complete flier is available to print through your browser or you can open with your Adobe PDF Reader, rotate counterclockwise and view on screen.

HGFlier Complete.pdf

Note: Same flier as above.  Click on flier for complete PDF. The complete flier is available to print through your browser or you can open with your Adobe PDF Reader, rotate counterclockwise and view on screen.

VVA General Liability Insurance.pdf

Click on VVA General Liability Insurance.pdf for complete PDF. The complete flier is available to print through your browser.

General Liability Insurance

VVA Chapters and State Councils in good standing are provided Commercial General Liability Insurance.  This General Liability Insurance “does not” provide coverage for loss or damage of the chapter, council, staff, members or volunteers.  General Liability Insurance provides coverage from third-party claims arising from actual or alleged allegations of: bodily injury, property damage, personal injury and advertising injury.  All of which must arise out of operations, activities, products or premises of a chapter or council.

For additional information on this policy click here.

Resources on Substance Abuse

How to Recognize an Alcohol Addiction
http://www.healthline.com/health/alcohol-addiction-recognizing-symptoms#Overview1

Drug Use Signs/Symptoms - Narconon
http://www.narconon.org/drug-abuse/signs-symptoms-of-drug-abuse.html

Helping a Family Member or Friend with an Addiction Problem
https://ncadd.org/family-friends/there-is-help/helping-a-family-member-or-friend

Guide to Addiction Prevention for Seniors
http://www.newbeginningsdrugrehab.org/guide-to-addiction-prevention-for-seniors/

Staying Sober: Dealing with Temptations
https://www.mentalhelp.net/blogs/staying-sober-dealing-with-temptations/

Addiction in the Waiting Room: How to Go to the Doctor in Sobriety
https://www.discoveryplace.info/addiction-waiting-room-how-go-doctor-sobriety

5 Signs You Have an Addictive Personality
http://www.mindbodygreen.com/0-15682/5-signs-you-have-an-addictive-personality.html

Stress Management: How to Reduce, Prevent, and Cope with Stress
http://www.helpguide.org/articles/stress/stress-management.htm

The Guide to Aquatic Therapy for Recovering Addicts
http://www.intheswim.com/eGuides/guide-to-aquatic-therapy-recovering-addicts

Addiction Recovery and Procrastination Habits
http://www.smartrecovery.org/resources/library/Articles_and_Essays/Most_Popular/procrastination.htm

Personal Goal Setting - How to Set SMART Goals
https://www.mindtools.com/page6.html

Security on the Internet

Know who you’re doing business with 

One of the best ways you can protect yourself from fraud and other online criminal activity is to know who you are doing business with. While many Web sites and emails are designed to look professional and secure, there are often telltale signs that can help you identify ones you want to avoid.  The Better Business Bureau has information about online fraud.

Here are some general tips about what to look for and what to avoid.

What to Avoid

  1. Don’t ever respond to pressure to buy. The Internet has no opening or closing time and so shop at your leisure and only buy when you are sure it’s safe.
  2. Don’t provide personal or payment information when requested through email.
  3. Avoid get rich quick schemes.

What to Do

  1. If you have any doubt about a company, check with the Better Business Bureau to make sure the company is legitimate.
  2. Check to ensure Web sites have a posted privacy policy. 
  3. Check refund and return policies before you buy.
  4. Protect your personal information. Never give out your user name or password in email and make sure you don’t use the same password for every site you go to. When you create a password for your financial institution, don’t use that password for any other site.
  5. Only provide credit card information or your social security number on a secured site. Look for the https:// in the URL. Check the URL as you go to each new page. The beginning of the URL, such as www.intuit.com should stay the same.

Here is the Better Business Bureau’s Quick Check List 

To help you shop safely online, take the following common sense steps:

  • Don’t rely on a professional looking Web site as proof of a company’s quality or good reputation. 
  • Investigate a company or seller before you buy. 
  • Find out where a company is physically located to help avoid overseas or offshore scams. 
  • Never give out your bank account number, credit card number, or personal information unless you’re certain a company is legitimate. 
  • Pay for your purchases by credit or charge card which can be protected under the Fair Credit Billing Act. 
  • Start with a small, inexpensive purchase to see how the company handles your order. 
  • Find out about a company’s return and refund policies before you purchase. 
  • Always use a secure Internet browser that “encrypts” or scrambles your personal or financial information. 

Phishing, pharming, vishing and smishing

Phishing

On the Internet, "phishing" refers to criminal activity that attempts to fraudulently obtain sensitive information. There are several ways a scam artist will try to obtain sensitive information such as your social security number, driver's license, credit card information, or bank account information. Sometimes a scam artist will first send you a benign email (think of this as the bait) to lure you into a conversation and then follow that up with a phishing email. At other times, the scam artist will just send one phishing email.

Here are some questions to ask if you think you have received a phishing attack:

  • Do you know the sender of the email? If yes, still be cautious before clicking a link. If no, do not click an links.
  • Are there any attachments in the email? If so, is the attachment an executable (a file with the extension .exe, .bat, .com, .vbs, .reg, .msi, .pif, .pl, .php)? If so, do not click on the attachment. Even if the file does not contain one of the above mentioned extensions, be cautious about opening it. Contact the sender to verify its contents.
  • Does the email request personal information? If so, do not reply.
  • Does the email contain grammatical errors? If so, be suspicious.
  • If you have a relationship with the company, are they addressing you by name?
  • Have you checked the link?  Mouse over the link and check the URL. Does it look legitimate or does it look like it will take you to a different Web site?

You can use these same questions if you receive a vishing or smishing attack.

Pharming

Pharming is another scam where a hacker installs malicious code on a personal computer or server. This code then redirects clicks you make on a Web site to another fraudulent Web site without your consent or knowledge. To avoid pharming, follow the basic computer safety guidelines in Protect Your Computer. Also, be careful when entering financial information on a Web site. Look for the key or lock symbol at the bottom of the browser. If the Web site looks different than when you last visited, be suspicious and don’t click unless you are absolutely certain the site is safe.

Vishing

Unfortunately, phishing emails are not the only way people can try to fool you into providing personal information in an effort to steal your identity or commit fraud. Criminals also use the phone to solicit your personal information. This telephone version of phishing is sometimes called vishing. Vishing relies on “social engineering” techniques to trick you into providing information that others can use to access and use your important accounts. People can also use this information to pretend to be you and open new lines of credit. 

To avoid being fooled by a vishing attempt:

  • If you receive an email or phone call asking you to call and you suspect it might be a fraudulent request, look up the organization’s customer service number and call that number rather than the number provided in the solicitation email or phone call. 
  • Forward the solicitation email to the customer service or security email address of the organization, asking whether the email is legitimate. 

Though vishing and its relative, phishing, are troublesome crimes and sometimes hard to identify, there are things that you can do to protect your identity.

Smishing

Just like phishing, smishing uses cell phone text messages to lure consumers in. Often the text will contain an URL or phone number. The phone number often has an automated voice response system. And again just like phishing, the smishing message usually asks for your immediate attention.

In many cases, the smishing message will come from a "5000" number instead of displaying an actual phone number. This usually indicates the SMS message was sent via email to the cell phone, and not sent from another cell phone.

Do not respond to smishing messages.

Recognize suspicious emails and Web sites that can do you harm 

On the Internet, "phishing" refers to criminal activity that attempts to fraudulently obtain sensitive information. There are several ways a scam artist will try to obtain sensitive information such as your social security number, driver's license, credit card information, or bank account information. 

Here are 3 common methods that phishers use in their emails:

  1. Spoofed email address. Don't reply to unsolicited email and don't open email attachments. You might be able to spot suspicious addresses by checking for misspellings or oddities, but this isn't foolproof so always be cautious. 
  2. Suspicious link. When in doubt, never click on a link in an unsolicited or suspicious email. Scam emails can contain a hidden link to a site that asks you to enter your log on and account information. A clue: if the email threatens you with account closure if you don't log on soon, you could be the target of phishing. You may be able to tell if a link is real by moving your mouse over it and looking at the bottom of your browser to see the hidden Web address - if it looks different than the one you see on the surface do not click on it. 
  3. Forged Web site. When you visit a financial site, like your bank or credit card company, type the URL into the browser manually. Use a browser with an anti-phishing plug-in or extension, like FireFox version 3 or higher or Internet Explorer 7 or higher. These browsers warn you about forged, high-risk sites. Phony Web sites mimic real sites by copying company logos, images, and site designs. Malicious webmasters can also use HTML, Flash or Java Script to mask or change a browser address.

Here's what you can do to protect yourself from a phishing attack:

  1. If you suspect you have received a phishing email, please forward it your service provider immediately.
  2. Make sure you subscribe to an anti-virus software and keep it up-to-date. 
  3. Make sure you have updated your Web browser to one that includes anti-phishing security features, such as Internet Explorer 7 or Firefox version 3 or higher. 
  4. Make sure you keep up to date on the latest releases and patches for your operating systems and critical programs. These releases are frequently security related. With some operating systems, you can turn on automatic updates. If you don’t know how to do so, check with your operating system manufacturer. 
  5. Do not respond to emails asking for account, password, banking, or credit card information. 
  6. Do not open up an attachment that claims to be a software update. We will not send any software updates via email. 
  7. Do not respond to text messages or voicemails that ask you to call a number and enter your account number and pin. 
  8. Make sure you have strong passwords on your computer and your account and/or payroll file.

Forms

The following forms are in Adobe PDF.  You can read, see, and print the forms from this site.

NEW VVA Annual Financial Report

VVA State Council and Chapter Election Report Form

VVA Membership Application (Lifetime Membership now only $100)

VVA Membership Brochure

VVA Membership Transfer Form

VVA Membership Roster Options

VVA Release of Delegate Form

VVA 2017 Convention Registration Form

Telehealth & Technology

The National Center for Telehealth and Technology (T2) is a component center of the Defense Centers of Excellence for Psychological Health and Traumatic Brain Injury (DCoE) and part of the Military Health System (MHS). T2 was established as a DoD organization at Joint Base Lewis-McChord in 2008 from the Army Behavioral Health Technology Office (ABHTO) at Madigan Army Medical Center. T2 has an office in the National Capitol Region for coordination with DCoE and other DoD, VA and government agencies. 

The National Center for Telehealth & Technology is comprised of clinical psychologists, researchers, interactive designers, and technical specialists who develop behavioral health assessment, screening, reference, and treatment tools for the military community. 

Our mission is to lead the development of telehealth and technology solutions for psychological health and traumatic brain injury to improve the lives of the Nation’s Warriors, Veterans, and their Families. T2 seeks to identify, treat, and minimize or eliminate the short and long-term adverse effects of TBI and mental health conditions associated with military service. T2 partners with the Department of Veterans Affairs (VA) and other organizations throughout the world. 

                                                                                                              Warfighter Brain Health Portal

The National Center for Telehealth & Technology (T2) designs, builds, tests, and evaluates available and emerging technologies to deploy in support of psychological health and traumatic brain injury recovery in the military community. Equally important is our work toward eradicating stigma that can deter people in the military from seeking help.

Comprised of clinical and research psychologists, web developers, interactive designers, and technical specialists, T2 develops a range of web-, mobile- and Virtual Reality-based assessment, monitoring and treatment tools. T2 also conducts quality research to evaluate existing and emerging technologies for efficacy. MORE >

T2’s Virtual PTSD Experience Receives Honors

T2’s Virtual PTSD Experience was awarded a 2012 Computerworld Laureate in the Emerging Technology category. 

The T2 Virtual PTSD Experience is an immersive, interactive learning experience to educate service members and other visitors about combat-related post traumatic stress disorder through simulated scenarios. 

To be nominated for the Computerworld Honors Program, the project must provide a significant benefit to society in one of 10 categories.  The project must address a social or humanitarian need and either alleviate or resolve it.  It must currently be in use and be demonstrating measurable results for its targeted beneficiaries.  The submission must also be new technology or a
technology applied in a new way.  Click here for more information on T2’s Virtual PTSD Experience.

Technology Projects

The Department of Defense Suicide Event Report (DoDSER) provides suicide surveillance for all branches of the military. This web application allows the military to capture detailed information about suicide events. The DoDSER is one of the primary sources of DoD-level suicide event data. MORE >

Telehealth Education and Training

T2 offers telemental health training and tools to provide military behavioral health clinicians and administrators with the essential clinical and technical skills required to clearly understand and effectively deliver telemental health services. T2 is the primary Department of Defense resource for integrating technology with psychology. MORE >

Spotlight on T2

News items that highlight the National Center for Telehealth and Technology (T2) activities, products and research.

PTSD Coach Mobile App wins the ATA President...

(Articles)

Caring for wounded warrior hearts

Warrior Care Blog

(Articles)

Law bridges gap in mental health care

ArmyTimes.com

(Articles)

DoD Website Connects Military Kids

Defense.gov

(Articles)

Read More

Featured Mobile Application

The Tactical Breather application can be used to gain control over physiological and psychological responses to stress. Through repetitive practice and training, anyone can learn to gain control of your heart rate, emotions, concentration, and other physiological and psychological responses to your body during stressful situations.   MORE >

 

Helpful Websites

AfterDeployment.org
Delivers content that helps returning service members, veterans, and their loved ones deal with the range of deployment-related emotional, physical, and relationship issues they face at home.

SuicideOutreach.org
Potentially lifesaving information for people experiencing suicidal feelings, and people who suspect a friend or loved one may have such feelings. This site will put you in touch with people and info that can help you through the tough times.


MKC Logo small 90x90

Military Kids Connect.  Lest not us for get about the kids.  Whether children, adult children or grandchildren of Vietnam veterans who had boots on the ground or today's warriors who have had and are having multiple deployments from the Gulf War, Iraq and Afghanistan.  Check out this very important link for today's kids.  Veterans concerned with issues from Vietnam should go to the Agent Orange site or VVA.


Check out this site in its entirety - click here!

WI CVSOs

WICVSO Logo

Your County Veteran Service Officer (CVSO) should be your first stop in seeking nearly any type of assistance.  If you are not connected to a CVSO click here to locate the CVSO in your county or reservation in Wisconsin.

images-6






Additional reference material and resources are available through the Wisconsin Department of Veterans Affairs by clicking here.


charming

© VVA-Wisconsin State Council 2012-2017          Webmaster: J Mullarkey          Website problems click here.     Sitemap