Remove Files Remove Law Remove Phone Remove Policy
article thumbnail

How to Create a Volunteer Handbook Your Volunteers Will Use

Get Fully Funded

If your organization relies on volunteers, even just a little, you need a volunteer handbook that spells out expectations, policies, and procedures. Include email addresses of all employees and phone numbers of those who work directly with volunteers. Most volunteers don’t know the law exists.

Volunteer 119
article thumbnail

Do You Need to Register to Fundraise Online? A Crash Course

Get Fully Funded

As a nonprofit leader, you are likely familiar with donation solicitation laws. In order to solicit donations, you’ll need to follow your state’s filing requirements and properly register before collecting donations. Just file Form 8868 prior to your deadline instead to give yourself some extra time. What is online fundraising?

Course 64
professionals

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cyber Security 101: Basics for Nonprofits

sgEngage

According to research by NTEN, the Nonprofit Technology Network, 80% of nonprofits don’t have a policy to address cyberattacks. A good place to start building a policy (if you don’t already have one) is to assess your organization’s risk with our checklist. Vishing is using phone calls or voicemail for malicious intent.

Policy 83
article thumbnail

Moving to the Cloud? Keep These 8 Security Tips in Mind

Tech Soup

For example, you can use SharePoint to host and share files instead of going with a third-party cloud storage provider like Box. In late 2016, note-taking service Evernote caught some flack for a change in its privacy policy that would have allowed employees to be able to access customers' data stored on Evernote's servers.

Mind 58
article thumbnail

Calling All Nonprofits: Its Time for a Privacy Upgrade

NTEN

And our members also rely on technology to take part, booking reminders in online calendars or using GPS-enabled cell phones to get to events. But ECPA was enacted in 1986, when Ronald Reagan was President, cell phones were as big as your head, and the Web did not even exist. Cloud computing is a prime example.

Law 55
article thumbnail

Mobile for Good: iOS Threats, Creepy Cookies, and Some Good News

Tech Soup

Paul Ohm, a senior policy adviser to the Federal Trade Commission and associate professor at the Colorado Law School, told The Washington Post , "You're making it very difficult for people who want privacy to find it on the Internet. security malware office saferonline microsoft mobile phones Office365 privacy'

Mobile 44
article thumbnail

Mobile for Good: iOS Threats, Creepy Cookies, and Some Good News

Tech Soup

Paul Ohm, a senior policy adviser to the Federal Trade Commission and associate professor at the Colorado Law School, told The Washington Post , "You're making it very difficult for people who want privacy to find it on the Internet. security malware office saferonline microsoft mobile phones Office365 privacy'

Mobile 41