Remove Accessibility Remove Application Remove Document Remove Files
article thumbnail

How to Minimize Risk Throughout Your Grant Cycle

sgEngage

To mitigate risk throughout your grant cycle, you need to know your grantees through relationships and documentation, support their internal controls, and set up a process for whistleblower complaints. Depending on how your application is set up, you can add an open-ended question or discuss it during a follow-up conversation.

Grant 91
article thumbnail

Safeguarding Good: Cybersecurity for Nonprofits 101

Qgiv

Because nonprofits run off of donations, many organizations also have limited access to IT support. Spoofing occurs when someone with malicious intent disguises their identity to gain unauthorized access to systems or data. Understand and document your organization’s assets, risks, and vulnerabilities.

Nonprofit 111
professionals

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

4 Tips For Maintaining Your Nonprofit’s Databases

TechImpact

However, database are also used for storing records, files, other types of information. Duplicate files, profiles, and other data are common for every organization. Let’s not for get the multiple files you might have on one donor or volunteer. Have employees left your nonprofit, but still have account access?

Database 238
article thumbnail

Best Practices for Securing Data in Humanitarian Crisis Situations

Saleforce Nonprofit

In recent years, the international humanitarian community has responded with a number of data protection guidance documents, such as those from USAID , ICRC , OCHA , and the Harvard Humanitarian Initiative. The first step is to clearly understand why the system, application, or data collection ought to exist in the first place.

Practice 120
article thumbnail

The Ultimate Guide to Accounting Software for Nonprofits

Nonprofit Tech for Good

At a nonprofit, a donation must be tracked throughout the accounting process, and if the funds are restricted, supporting documentation is required to prove that the funds were only used for the stated purpose. If you are a grantor you may need additional tools to handle the application, award, and post-award processes.

Software 300
article thumbnail

5 Nonprofit Tech Solutions For Improving Internal Communication

TechImpact

Also, remote employees might not have their own office phone, or always have access too it, making it necessary for staff to include their personal cell phone number as a method of business contact. File sharing. TechSoup reports that 26% of the 2012 survey respondents were using a cloud-based file sharing service.

article thumbnail

Unlocking the Power of APIs: The SKY is the Limit!

sgEngage

As anyone without a programming background can attest, the two ways to get going are: Find documentation and getting-started resources somewhere online Search Stack Overflow and see how someone else did (some of) it My journey utilized both strategies. The goal was the same then as it is now: Use it to make something work better.

API 91