Remove Accessibility Remove Application Remove Laptop Remove System
article thumbnail

Remote Technology in the Pandemic: Rebalancing Toward Equity and Access

Non Profit Quarterly

Not all leaders think that way, but organizations that value equity of access must consider the plights of those who might be systematically excluded from engagement efforts. Although we did not start with a particular emphasis on equity and access, this theme came up regularly in our conversations with the field.

article thumbnail

Best Practices for Securing Data in Humanitarian Crisis Situations

Saleforce Nonprofit

We believe that technology systems intended to be used in fragile environments must be “protective by design,” and seek from the outset to minimize the risk of harm. The first step is to clearly understand why the system, application, or data collection ought to exist in the first place. Learn more. Learn more. Learn more.

Practice 120
professionals

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

5 Reasons Why Your Nonprofit Should Care About Cloud Computing

TechImpact

Mail, and Google Docs are all examples of cloud-based applications, also known as software as a service (SaaS). Cloud computing, simply put, is a way for your computer to access computing power via the internet. This is great if you are planning to use a cloud system for one or two applications in your organization.

Doc 197
article thumbnail

4 Digestible Cloud Computing Facts

TechImpact

When a cloud is accessed, your computations are occurring from a remote location and your computer screen is simply displaying the results of those computations that are taking place in an off-campus data center. A cloud-based constituent relationship management (CRM) system is the modern way to run in-office donor databases.

Laptop 143
article thumbnail

PCI Compliance for Nonprofits Guide

Greater Giving

To be considered PCI compliant, you must: Ensure all systems that store, process or transmit cardholder data have been tested for vulnerability and remediated if necessary. Conduct an annual penetration test by a qualified third-party pen-test team against your critical systems on an ongoing basis.

Guide 40
article thumbnail

Cloud Integration Solutions – What’s the Deal?

Connection Cafe

One thing that has not changed, however, is the need to have access to all of this data in a common location so that it can be analyzed, and then leveraged as effectively as possible to build the strongest relationships possible with donors, supporters, and other organizational constituents. Okay, so what exactly is ‘the cloud’?

article thumbnail

17 Smart Ways To Protect Data At Your Nonprofit

Global Giving

Only access or knowingly attempt to access data that you are authorized to use as a part of your role and job responsibilities. Protect confidential information by encrypting it, limiting access to it, minimizing the number of copies of it, and deleting the data when it is no longer needed. See Tip #11 ).

Data 52