Remove everything-about-a-learning-management-system
article thumbnail

Nonprofit Guide to US Digital Privacy Laws: CCPA, SHIELD

Whole Whale

There are two new major online privacy policy changes coming in 2020, the CCPA in California and SHIELD act in New York. These acts mimic the standard set by the European Union with GDPR and many of the policies will sound familiar. Special thanks to RoundTable Technology, a leader in cyber security for nonprofits.

Law 52
article thumbnail

The 6 Basic Nonprofit Board Responsibilities 

Neon CRM

But the board is responsible for ensuring that the nonprofit has all the necessary legal, ethical, financial, and overall good governance policies in place to succeed long-term. Having a strong, engaged board is one of the most underappreciated keys to nonprofit success–but building one is no easy task. Let’s get started!

professionals

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Art Brings People Together: Measuring the Power of Social Bridging

Museum 2.0

Earlier this fall, I read this headline: "Stanford study: Participation in a cultural activity may reduce prejudice." I eagerly read about a new social psychology research study in which whites, Asians, and Latinos engaged in a simple collaborative activity--making a music video together. I wanted to know more.

Measure 47
article thumbnail

Tech Policies for Virtual Teams: A Leader’s Responsibility

Non Profit Quarterly

Welcome to “Tech Policies for Virtual Teams—A Leader’s Responsibility.” And I’ll introduce them, and you’ll learn a little bit more about Tech Impact if you don’t already know about them in a moment. So that’s what today is about. Good afternoon, everybody. My name is Jeanne Bell. We have multiple polls.

Policy 102
article thumbnail

Best Practices for Protecting Your K–12 School from Cybersecurity Threats

sgEngage

Your school may have the best firewalls and technical protections in place, but attackers can get into your system if one employee makes one mistake. Systems that hold student information should be HIPAA, LTI (Learning Tools Interoperability), and OneRoster 1.1 Most Common Threats to K–12 Cybersecurity.

Practice 114
article thumbnail

[VIDEO] How to Talk about Legacy Giving Without Seeming Creepy

Bloomerang

If you’re watching the recording, I hope everything’s going well with you because we are here to talk about legacy giving, specifically how to talk about legacy giving without being a little creepy or off-putting. And you can learn more about us. Important topic, one of my favorite topics. Claire: Good.

Video 131
article thumbnail

Best Practices for Protecting Your K–12 School from Cybersecurity Threats

sgEngage

Your school may have the best firewalls and technical protections in place, but attackers can get into your system if one employee makes one mistake. Systems that hold student information should be HIPAA, LTI (Learning Tools Interoperability), and OneRoster 1.1 Software vendors have access to a great deal of your information.