Recording: Establishing Tech Policies to Protect Your Nonprofit — Three-Part Course
Are you providing guidance to help staff members avoid scams, malicious software, and the inappropriate handling of data? Do staffers use their personal phones or computers to do work? What guidelines are in place to make sure your social media posts are appropriate? Do you know what to do if your offices experience a flood or fire?
Three 90-minute webinars
If you don’t have written policies—and regular training to ensure that people understand those policies—your organization may be facing bigger risks than you think. This course will walk you through the questions you should consider as you develop policies to protect your nonprofit.
Throughout this course, you will:
- Consider the various risks your nonprofit faces and the level of risk you’re comfortable with.
- Ask yourself important questions about what is and is not acceptable use of organization resources and tools.
- Learn how to manage people and data to keep your organization safe from malicious attacks and honest mistakes.
- Walk through the pros and cons of whether staff members should use their personal devices for work.
- Consider the ways you can partner with your staff members to protect organization data on personal devices.
- Review what you’ll need to do if your office experiences a major disaster such as flood, earthquake, or ransomware.
- Gain the knowledge you need to write smart policies to protect constituents, staff members, and your organization.
All sessions last 90 minutes.
Session 1: Acceptable Use and IT Security
Computers and office software are so familiar it’s easy to assume that everyone knows what’s OK and what’s not. But that false sense of security can cause a lot of problems. This session will help you develop clear guidelines for what is and is not acceptable on organization devices and networks. We’ll also provide IT security tips to guide your policy so that you’re less likely to fall victim to ransomware and other malicious software.
Session 2: Bring Your Own Device Policies
Nonprofits and staff members appreciate the convenience of being able to do work at home or on the road using a personal device. However, without good policies, the blurred lines between work and personal life can cause issues and put your data at risk. We’ll discuss what to consider as you develop a policy for that’s fair and protects your organization.
Session 3: Disaster Recovery
The potential for disaster is everywhere. Hurricane, flood, tornado, earthquake—and those are just the big ones. What will you do if your systems are infected with ransomware or someone accidentally deletes important files? What about if your executive director or top IT staff storms out and takes all of their institutional knowledge (and passwords) with them? We’ll walk you through the potential disasters and guide you through developing a plan that will help you get your organization back up and running as quickly and as safely as possible.
About the Presenter
Joshua Peskay, Vice President, RoundTable Technology
Joshua is an expert trainer for Idealware and Vice President of RoundTable Technology, a technology service provider in New York and Maine. Joshua has been helping nonprofit organizations improve their use of technology since the early 1990’s and has worked with more than 1,000 organizations. He specializes in helping organizations be strategic about their technology and make smart choices about services, support, and management.
Idealware, a 501(c)(3) nonprofit, provides thoroughly researched, impartial and accessible resources about technology to help nonprofits make smart technology decisions.