RECORDING: ESTABLISHING TECH POLICIES TO PROTECT YOUR NONPROFIT

Clear, concise policies governing the use of technology can help protect your nonprofit against the risks of scams, malicious software, and bad data handling practices. Do you have guidelines in place to ensure appropriate staff use of social media? Does your staff know what to do in the event of a natural disaster such as a flood, fire, or ransomware attack? How do you manage staff use of phones or computers that mix personal and work data?


If you don’t have written policies—and regular training to ensure that people understand them—your organization may face bigger risks than you think. Over three 90-minute webinars, we’ll walk you through the questions you should consider as you develop policies to protect your nonprofit.

Throughout this course, you will:

  • Identify the risks your nonprofit faces and the level of risk with which you’re comfortable.
  • Ask yourself important questions about what is and is not an acceptable use of organization resources and tools.
  • Learn to manage people and data to keep your organization safe from malicious attacks and honest mistakes.
  • Walk through the pros and cons of whether staff members should use their personal devices for work.
  • Consider the ways you can partner with your staff to protect organization data on personal devices.
  • Review what you’ll need to do if your office experiences a major disaster such as flood, earthquake, or ransomware.
  • Gain the knowledge you need to write smart policies to protect constituents, staff members, and your organization.


Session 1: Acceptable Use and IT Security


Computers and office software are so familiar it’s easy to assume that everyone knows what’s OK and what’s not. But that false sense of security can cause a lot of problems. This session will help you develop clear guidelines for what is and is not acceptable on organization devices and networks. We’ll also provide IT security tips to guide your policy so that you’re less likely to fall victim to ransomware and other malicious software.

Session 2: Bring Your Own Device Policies

Nonprofits and staff members appreciate the convenience of being able to do work at home or on the road using a personal device. However, without good policies, the blurred lines between work and personal life can cause issues and put your data at risk. We’ll discuss what to consider as you develop a policy for what’s fair and protects your organization.

Session 3: Disaster Recovery

The potential for disaster is everywhere. Hurricane, flood, tornado, earthquake—and those are just the big ones. What will you do if your systems are infected with ransomware or someone accidentally deletes important files? What about if your executive director or top IT staff storms out and takes all of their institutional knowledge (and passwords) with them? We’ll walk you through the potential disasters and guide you through developing a plan that will help you get your organization back up and running as quickly and as safely as possible.

About the Presenter

Joshua Peskay, Vice President, RoundTable Technology

Joshua is an expert trainer for Tech Impact’s Idealware and Vice President of RoundTable Technology, a technology service provider in New York and Maine. Joshua has been helping nonprofit organizations improve their use of technology since the early 1990s and has worked with more than 1,000 organizations. He specializes in helping organizations be strategic about their technology and make smart choices about services, support, and management.

About Idealware

Idealware is a program of the nonprofit Tech Impact. We are the authoritative source for independent, thoroughly-researched technology resources for the social sector. Our publications, assessments, and training can save you time and money by providing impartial guidance that gives you the knowledge and confidence you need to decide what’s best for your organization. Browse our archives, sign up for our mailing list, or learn more at www.idealware.org.