Idealware: Establishing Tech Policies to Protect Your Nonprofit
Tell a Friend About This EventTell a Friend
Idealware: Establishing Tech Policies to Protect Your Nonprofit

Does your nonprofit have policies in place that clearly outline how to use technology appropriately? If not, join us for Establishing Tech Policies to Protect Your Nonprofit to learn how to write policies that reduce risk and prepare your organization for the unexpected.

8/10/2017 to 8/24/2017
When: Aug 10 - 24
12:00 - 1:30 PM CDT
Where: Online
Contact: Idealware

« Go to Upcoming Event List  


Three 90-minute webinars, Thursdays between August 10 – 24.

Regular Price/NAM Member Discount: $120 / $95


NAM members: enter NAM2017 at checkout to receive your discount!

Are you providing guidance to help staff members avoid scams, malicious software, and the inappropriate handling of data? Do staffers use their personal phones or computers to do work? What guidelines are in place to make sure your social media posts are appropriate? Do you know what to do if your offices experience a flood or fire? 

If you don’t have written policies—and regular training to ensure that people understand those policies—your organization may be facing bigger risks than you think. This course will walk you through the questions you should consider as you develop policies to protect your nonprofit.

Throughout this course, you will:

  • Consider the various risks your nonprofit faces and the level of risk you’re comfortable with.
  • Ask yourself important questions about what is and is not acceptable use of organization resources and tools.
  • Learn how to manage people and data to keep your organization safe from malicious attacks and honest mistakes.
  • Walk through the pros and cons of whether staff members should use their personal devices for work.
  • Consider the ways you can partner with your staff members to protect organization data on personal devices.
  • Review what you’ll need to do if your office experiences a major disaster such as flood, earthquake, or ransomware.
  • Gain the knowledge you need to write smart policies to protect constituents, staff members, and your organization.
Toolkit Schedule

All sessions take place Thursday at 12:00 pm Central and last for 90 minutes.

August 10: Acceptable Use and IT Security
Computers and office software are so familiar it’s easy to assume that everyone knows what’s OK and what’s not. But that false sense of security can cause a lot of problems. This session will help you develop clear guidelines for what is and is not acceptable on organization devices and networks. We’ll also provide IT security tips to guide your policy so that you’re less likely to fall victim to ransomware and other malicious software.

August 17: Bring Your Own Device Policies 
Nonprofits and staff members appreciate the convenience of being able to do work at home or on the road using a personal device. However, without good policies, the blurred lines between work and personal life can cause issues and put your data at risk. We’ll discuss what to consider as you develop a policy for that’s fair and protects your organization.

August 24: Disaster Recovery
The potential for disaster is everywhere. Hurricane, flood, tornado, earthquake—and those are just the big ones. What will you do if your systems are infected with ransomware or someone accidentally deletes important files? What about if your executive director or top IT staff storms out and takes all of their institutional knowledge (and passwords) with them? We’ll walk you through the potential disasters and guide you through developing a plan that will help you get your organization back up and running as quickly and as safely as possible. 

Other Info
Participants will also be given weekly “homework” assignments. 
Please register with the email address where you would like to receive the access code and dial-in information for the online seminar. All registered participants are granted access to the recordings of each session. Participants who cannot attend any of the sessions due to scheduling conflicts will still have access to the toolkit presentation decks and handouts.