Identity Theft: Protect your Organization Today

May 25, 2011

NPO leaders probably know best how long it takes to form strong, mutual relationships with donor groups, and how quickly those relationships can dissolve.  Well imagine how quickly these relationships could be destroyed if donors, volunteers, clients, or sponsors discovered that their nonpublic information was compromised from a breach that originated from within your NPO.  This breach can result in identity theft, which is America’s fastest growing white-collar crime.   And with today’s ever-changing technology, including online access to the global marketplace and personal data files, this is becoming a concern and even greater risk. 

The following are some ways Kimberly Woods, a twenty-year development professional, discusses how an NPO can experience a devastating breach of security:

  • An employee is reviewing the giving history of a large contributor, but leaves their desk to pick up data from a printer down the hall.
  • The fiscal year has ended and it’s time to toss old files in the dumpster outside the building.
  • Copies of donor’s contribution check were left behind on the copy machine.
  • An employee left your organization two weeks ago, but they still have password access to online data and their building security card was never turned in.
  • The receptionist has slips of paper on her desk containing donor credit card information.
  • Nonpublic information and data was mistakenly made available on the website.
  • Your organization has a formal Privacy Policy, but employees haven’t been trained on it yet.
  • A company laptop was stolen from a locked car or left unattended in public “just for a moment.”
  • The flash drive was left behind on the key chain of the company vehicle while being serviced.
  • Information was faxed or given over the phone to unauthorized recipients.

It is important to remember to take extra precautions when handling people’s nonpublic and personal data, especially with today’s technological advances.

Reference:  “Identity Theft—the Perfect Storm: How Safe is your Organization’s Nonpublic Information” By Kimberly Woods

One Response to “Identity Theft: Protect your Organization Today”

  1. Terri Fredlund Says:

    There are plenty of unscruplous people around who will try to adopt your identity in order to get what they want (normally money). And while it doesn’t help if you do what I do – publish not only your email address and phone number on your website, but also a map on how to get to your house on foot – trying to conceal your identity from everyone is not the answer either.’

    Latest piece of content on our own web site

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: