Logo.png
Ë
    By Drew Fox Jordan • January 14, 2021

    How To Know If Your Data Is Safe - Both Internally and Externally

    For nonprofits, data security is a team effort. Internal policy, employee training, and proper end-point security are a must to protect against breaches. However, nonprofits also work with outside vendors that have access to sensitive data as well. All of a sudden, data security extends beyonds the walls of the organization. It seems everyone understands that development offices hold sensitive donor data and require high-level security measures to keep that data safe. But no one seems to question why fundraising software vendors, who have access to the same donor data, aren't held to similarly high expectations of security.

    How To Know If Your Data Is Safe - Both Internally and Externally

    As nonprofits become increasingly dependent on innovative technologies, leaders cannot lose sight of what is most important in working with 3rd party vendors: trust. They need to know that all the bases are covered at a time where cybersecurity has never been more important. That's why nonprofits should seek out software vendors that are System and Organization Controls (SOC) compliant.

    SOC 2 reports focus on service providers that host or store data, ensuring that they are following industry best practices and their operations are up to code. The SOC 2 report contains a description of the infrastructure, software, people, and procedures that the company has in place to protect and safeguard data. A SOC 2 report contains descriptions of what components the company has and what it does to make sure it successfully delivers on the five Trust Service Principles:

    • Security – Data is protected against unauthorized access, unauthorized disclosure of information, and damage to systems that could compromise donor data and affect the organization's ability to carry out its mission.
    • Availability  Information is available for operation and use to meet the entity’s objectives.
    • Processing integrity  System processing is complete, valid, accurate, timely, and authorized to meet the organization’s objectives.
    • Confidentiality  Information designated as confidential is protected to meet the organization’s objectives.
    • Privacy  Personal information is collected, used, retained, disclosed, and disposed to meet the organization’s objectives.

    So why is it so important for a vendor to be SOC 2 compliant? It is an outstanding standard for nonprofit leaders because it provides them with the peace of mind that their software partners can deliver what it promises. A company that is SOC 2 compliant has proven that it can keep its customers’ sensitive data secure over time. When it comes to donor data, that reliability is essential.

    Gravyty is committed to reducing risk for all customers, regardless of size. This mission includes the way we develop our SaaS and AI-based solutions, as well as the ways in which we secure our company and our customer’s data. As the first nonprofit AI technology company to pass SOC 2 certification, Gravyty demonstrates our commitment to raising expectations for technology in the nonprofit sector delivering first-class solutions that produce tangible results as an enterprise-ready solution.

    How To Know If Your Data Is Safe - Both Internally and Externally

     Prospective customers and partners can now request a copy of Gravyty’s SOC 2 report as part of their compliance strategy. To learn more about Gravyty and SOC 2, talk to a Gravyty specialist today and find out what sets us apart as the nonprofit sector's leading AI provider.

    Posts by Topic

    see all