Remove privacy-policy
article thumbnail

17 Smart Ways To Protect Data At Your Nonprofit

Global Giving

With GDPR coming into effect in the European Union and privacy scandals making headlines, many nonprofit professionals are concerned about data protection. These guidelines can also inform the development of your nonprofit’s security policy, if you do not have one already. Here is GlobalGiving’s Privacy Policy.

Data 52
article thumbnail

Google Health launches … and it’s not HIPAA compliant

Zen and the Art of Nonprofit Technology

Home About Me Subscribe Zen and the Art of Nonprofit Technology Thoughtful and sometimes snarky perspectives on nonprofit technology Google Health launches … and it’s not HIPAA compliant May 20, 2008 Yesterday, the big news is that Google Health launched. Before you sign up, read the privacy policy carefully.

Google 100
professionals

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What is cloud computing?

Zen and the Art of Nonprofit Technology

Home About Me Subscribe Zen and the Art of Nonprofit Technology Thoughtful and sometimes snarky perspectives on nonprofit technology What is cloud computing? Always read the privacy policy – if you have sensitive data, this might be a deal-breaker Always maintain your own backups. Make sure access is secure.

AJAX 134
article thumbnail

A goodbye to Facebook and LinkedIn?

Zen and the Art of Nonprofit Technology

Home About Me Subscribe Zen and the Art of Nonprofit Technology Thoughtful and sometimes snarky perspectives on nonprofit technology A goodbye to Facebook and LinkedIn? at 8:16 am Privacy of data especially for a business social network is very important to most of linkedin and facebooks users. at 8:38 am Well, privacy from whom?

Linkedin 100
article thumbnail

Best Practices for Protecting Your K–12 School from Cybersecurity Threats

sgEngage

Your school may have the best firewalls and technical protections in place, but attackers can get into your system if one employee makes one mistake. Systems that hold student information should be HIPAA, LTI (Learning Tools Interoperability), and OneRoster 1.1 Vishing uses phone calls or voicemails for a similar art of deception.

Practice 114
article thumbnail

Preparing for the Next Disaster: The Future of #crisisdata

NTEN

Participants in the Summit recognized that if we can overcome challenges of verification, duplication, language, privacy, and culture, we will be in a position to empower the public to share valuable information with all of us. Multiple organizations and systems were having trouble coordinating and sharing information.

article thumbnail

Best Practices for Protecting Your K–12 School from Cybersecurity Threats

sgEngage

Your school may have the best firewalls and technical protections in place, but attackers can get into your system if one employee makes one mistake. Systems that hold student information should be HIPAA, LTI (Learning Tools Interoperability), and OneRoster 1.1 Vishing uses phone calls or voicemails for a similar art of deception.