This put up was written by: Joanna Bowen, Lana Cooper, & Sara Doubleday.

On Friday June 24, 2022, the Supreme Court docket overturned the landmark Roe v. Wade ruling, ending almost 50 years of secure, constitutionally-protected entry to abortion. Whereas the fallout from Roe v. Wade being overturned continues to be unfolding, members of Seer’s Analytics & Insights (A&I), Neighborhood Impression, Paid, and search engine optimization divisions put their heads collectively to share some finest practices for organizations to observe within the weeks and (doubtlessly) years forward to guard delicate personally identifiable data (PII).

PII is person data that may be straight or not directly (when related with different information) used to establish an individual. Organizations owe it to donors and volunteers to guard their PII.

We perceive that this will really feel considerably overwhelming and you could not know the place to start out. However don’t fear! We’ll stroll you thru it. At Seer, we owe it to our non-profit group companions to make use of our data and enable you defend your donors and volunteers.

10 Knowledge Privateness Suggestions for a Submit-Roe World

Presently, many nonprofit organizations are nonetheless navigating what the overturning of Roe v. Wade means for them on a number of ranges. Whereas legal guidelines might range from state to state, the position of activism, volunteering, and providing monetary help to establishments that proceed to combat for bodily autonomy shall be extra essential than ever.

With that in thoughts, listed here are 10 methods organizations can defend delicate private information for donors, volunteers, and the folks they service:

Defending PII in Electronic mail

Whether or not you’re a CEO, supervisor, or volunteer with a company, everybody makes use of electronic mail. For nonprofits, a well-thought electronic mail marketing campaign is a strong software for reaching donors and potential volunteers.

Nonetheless, with nice energy comes nice duty. You’ll wish to be sure that subscribers (and people who have unsubscribed) have their electronic mail addresses protected, and likewise make sure that donor data (together with names, house or enterprise addresses, emails, IP addresses, and bank card data) isn’t leaked on-line.

To protect confidentiality and PII when utilizing electronic mail:

1 – Use encryption for transmitting delicate information.

Make sure that your emails are encrypted. Your IT staff may help you arrange correct protocols. Electronic mail purchasers like Gmail and Outlook will present you the extent of encryption (for each sender and receiver).

As an example, in Gmail, search for a “lock” icon within the “recipients” dropdown. There are different levels of encryption relying on the colour of a lock icon.

2 – Use a mail shopper to distribute newsletters and advertising data.

In case you plan to make use of an electronic mail shopper, look into their insurance policies round information safety and privateness.

As an example, MailChimp has robust documentation on how they defend data for all customers. Do a little analysis on electronic mail purchasers and examine their insurance policies to make an knowledgeable selection.

3 – No delicate information ought to be shared by way of electronic mail.

Really delicate data (resembling bank card data or different types of PII) ought to by no means be shared in an electronic mail within the first place. Somewhat, it ought to be submitted by way of an encrypted type.

Safeguarding PII Entry

Safeguarding PII isn’t simply a problem on your group’s IT division. It’s the duty of everybody concerned – from the entrance workplace to the entrance strains. Set up clear insurance policies to assist safeguard data and convey this throughout any onboarding course of.

To make sure administrative finest practices for dealing with entry to information:

4 – Don’t over-permissions anybody.

If somebody doesn’t want entry to related information, don’t give it to them. That features the CEO.

PII and pertinent information ought to solely be shared with those that are straight concerned on a need-to-know foundation to forestall leaks.

5 – Make it somebody’s job to repeatedly make methods safer.

Ensure that individual understands the expertise utilized by your group and is answerable for change administration. This might be a number of folks, in case you have a big staff.

6 – Don’t retailer passwords or API keys in your laptop. Use a password administration app as a substitute.

In case you’re sharing passwords to entry on-line assets throughout a big group, you could depart your self susceptible to that data falling into the fallacious palms.

An enterprise-level password administration app (like LastPass, for instance) can be utilized to encrypt passwords and make it simple to grant or revoke permissions to the suitable folks on the proper time.

A password administration app may also negate the necessity to keep in mind passwords and discourage sharing them by way of much less safe channels like electronic mail, textual content, immediate message, in your laptop, and many others.

7 – Take away person entry when somebody leaves your group.

If doable, create teams of roles, departments, and roles inside departments to keep away from including anybody’s particular person electronic mail to distribution lists. Including an electronic mail deal with to a bunch makes it simpler to revoke entry. Merely delete them from a bunch and their permissions shall be deleted all over the place.

8 – Distant administration of staff computer systems.

Moreover, in case your price range permits, think about issuing safe laptops for firm use solely and leverage distant administration of staff computer systems. This may enable computer systems and permissions to be turned off when an individual leaves in addition to releasing safety patches as wanted to the entire fleet of laptops.

Managing PII in Analytics

Ensuring electronic mail communications are encrypted and free from delicate, confidential data is essential to conserving donor and/or volunteer data secure. Moreover, you’ll wish to work together with your IT staff or laptop community administrator to tell these inside your administration to implement finest practices coupled with putting in protocols for information utilization at an administrative degree.

To safeguard delicate PII from unintentionally getting leaked on-line:

9 – In case you don’t want it, delete it!

It might be tempting to wish to maintain outdated donor data languishing in your database in case you could wish to attain again out at a later date to gauge curiosity. Nonetheless, keep away from storing personally identifiable data and solely retailer it when completely essential.

Work together with your administrative and/or IT staff to develop insurance policies round an inexpensive timeframe to purge outdated donor and volunteer data, and what constitutes correct PII utilization.

Make it a coverage to guard data of those people, in addition to anybody who might have unsubscribed to your group’s communications.

10 – Take away PII from URL strings.

In case you use varieties to seize donor data and course of funds, PII can accidentally get dumped into your Google Analytics (GA) files via URL strings. This can be prevented by encrypting forms and request values that may contain sensitive PII.

Chat with your IT or web team to be sure this is not happening and to stay on top of scrubbing PII from URLs to protect donor and/or volunteer data.

What Support Do You Need?

For pro-bono and nonprofit organizations, having a team of individuals with a background in Analytics and proper data storage will be mission-critical in staying up-to-date on the protocols and legalities associated with keeping donor data safe.

Don’t Have a Person Well-Versed in Analytics?

There are a few ways to help fill that void.

Google offers free courses via Skillshop that can assist you find out about Google Analytics 4 (GA4) and put these expertise into follow on your group.

In case you’re pressed for time and nonetheless not assured in your Analytics and information privateness capabilities, look to organizations like, which matches nonprofits to passionate, certified professionals with experience in a wide range of areas – from copywriting to advertising to analytics. Take into account organising a profile and interviewing volunteers who might be able to help or are prepared to conduct coaching with members of your staff.

The Proper to Select With Privateness

Along with the suitable to decide on, folks even have a proper to privateness for worry of their private views and causes they help getting used to discriminate towards them. Donors have an expectation of privateness when financially supporting a company that aligns with their private views, with out worry of retaliation if their deeply-held beliefs don’t align with these of their employer – and even members of the family.

Like many throughout the US, the Seer staff shall be conserving an in depth eye on how the rollback of Roe v. Wade might impression human rights, in addition to expertise and information privateness.

To remain within the loop, maintain studying about privateness’s impression on digital advertising.

Join our e-newsletter for extra posts like this in your inbox:

Similar Posts

Leave a Reply

Your email address will not be published.