{"id":661,"date":"2020-09-18T13:53:32","date_gmt":"2020-09-18T17:53:32","guid":{"rendered":"http:\/\/dev-tech-impact-guides.pantheonsite.io\/donor-management-systems\/?page_id=661"},"modified":"2020-09-24T13:14:40","modified_gmt":"2020-09-24T17:14:40","slug":"security-configuration-and-customization","status":"publish","type":"page","link":"https:\/\/guides.techimpact.org\/donor-management-systems\/security-configuration-and-customization\/","title":{"rendered":"Security, Configuration, and Customization"},"content":{"rendered":"<p>Recent high-profile incidents have served to emphasize the importance of security for any system that stores personal or sensitive information about individuals and organizations. Fundraising systems are a particularly appealing target for hackers due to the extensive donor profile and contact information and financial and credit card\/bank account data storage.<\/p>\n<p>Security begins with the login process. At the very least, the system you select should have password complexity requirements, such as requiring a certain number of characters and a mix of characters, numbers, and symbols. More secure systems will allow you to turn on two-step verification or Multi-Factor Authentication (MFA) for logins to require users to enter a code that is texted or emailed to them. A few systems allow Single Sign On (SSO) so that users can be authenticated with the credentials they use to access their organization\u2019s network. You should also ask if the system automatically logs users off after a period of inactivity.<\/p>\n<p>How does the system handle data encryption? Does it encrypt data at rest and\/or in transit? Are credit card numbers stored in the system or are they tokenized and stored in a PCI-compliant vault. How often do system backups run?<\/p>\n<p>It\u2019s also important to think through who has access to different types of data in your system. Most systems allow you to control access to certain fields and features based on different user roles. Some systems have a limited number of user roles that correspond to certain types of tasks or access to specific modules that you can assign to staff in your organization. Others support a larger number of roles that allow a more granular level of control over update, view, and delete rights for modules. Some even allow you to define rights for individual data fields.<\/p>\n<p>The donor data contained within the system belongs to you. Being able to extract it from the system is critical in order to back it up\u2014which is always a good idea\u2014or migrate it to a new system. Almost all of the systems in this guide allow you to freely export data, but it doesn\u2019t hurt to make sure. Most also allow you to easily import data, but check to see if there are additional costs to do so.<\/p>\n<p>Most donor management systems are designed to work for a wide variety of organizations. To facilitate this, they let you configure many of the field values throughout the system. For example, you can define the types of relationships your organization has with constituents\u2014those choices then show up in dropdown boxes throughout the system. A few systems let users move or hide navigation menu items or certain views throughout the system.<\/p>\n<p>But few systems let you move, remove, or change the names of default fields, and vary substantially in their ability to let you add new ones. Some let you add only a specific limited number of new fields, others don\u2019t let you add any at all, while still others allow unlimited new fields\u2014or even let you customize them further to allow unique-to-your-organization constituent interactions. Check to see where your new fields will be displayed in the interface\u2014often they must go into a limited \u201ccustom field\u201d area, which can become disorganized and awkward if you add a number of fields.<\/p>\n<p>A few systems can be almost completely customized to your needs\u2014either by you or the vendor\u2014with custom fields, labels, interfaces, processes, and functionality. For instance, because CiviCRM\u2019s open source system lets you access the underlying source code, an experienced programmer can make nearly limitless changes. This wholesale customization can be useful for organizations with unique needs, but it can be expensive to set up and more difficult to support down the road. It might be more effective to change your process than to customize a system around it.<\/p>\n<p>You should also ask vendors about accessibility features for users with disabilities. This is often not a priority in system development, but can be tremendously important to individuals in your organization and constituencies served by your nonprofit. The most common accessibility standards for web developers are WCAG 2.0 and WCAG 2.1, but even such measures as compatibility with screen readers and use of contrasting colors can make a big difference.<\/p>\n<p>Finally, if you have fundraising staff who often meet with potential donors away from the office, ask how the system functions on mobile devices or whether there is a mobile app available. This is also helpful if you want to use the system to check attendees in at events or to collect onsite registrations and donations.<\/p>\n<p><a href=\"http:\/\/guides.techimpact.org\/donor-management-systems\/support-and-training\/\"><strong>Next Section<\/strong><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Recent high-profile incidents have served to emphasize the importance of security for any system that stores personal or sensitive information about individuals and organizations. Fundraising systems are a particularly appealing target for hackers due to the extensive donor profile and &hellip; <a href=\"https:\/\/guides.techimpact.org\/donor-management-systems\/security-configuration-and-customization\/\">Read more<\/a><\/p>\n","protected":false},"author":14,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"wp_popup_display_lightbox":0,"wp_popup_suppress":"","wp_popup_trigger":"","wp_popup_trigger_amount":0,"wp_popup_disable_on_mobile":false,"footnotes":""},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Security, Configuration, and Customization - A Consumers Guide to Low-Cost Fundraising Software<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/guides.techimpact.org\/donor-management-systems\/security-configuration-and-customization\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security, Configuration, and Customization - A Consumers Guide to Low-Cost Fundraising Software\" \/>\n<meta property=\"og:description\" content=\"Recent high-profile incidents have served to emphasize the importance of security for any system that stores personal or sensitive information about individuals and organizations. Fundraising systems are a particularly appealing target for hackers due to the extensive donor profile and &hellip; Read more\" \/>\n<meta property=\"og:url\" content=\"https:\/\/guides.techimpact.org\/donor-management-systems\/security-configuration-and-customization\/\" \/>\n<meta property=\"og:site_name\" content=\"A Consumers Guide to Low-Cost Fundraising Software\" \/>\n<meta property=\"article:modified_time\" content=\"2020-09-24T17:14:40+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/guides.techimpact.org\/donor-management-systems\/security-configuration-and-customization\/\",\"url\":\"https:\/\/guides.techimpact.org\/donor-management-systems\/security-configuration-and-customization\/\",\"name\":\"Security, Configuration, and Customization - A Consumers Guide to Low-Cost Fundraising Software\",\"isPartOf\":{\"@id\":\"https:\/\/guides.techimpact.org\/donor-management-systems\/#website\"},\"datePublished\":\"2020-09-18T17:53:32+00:00\",\"dateModified\":\"2020-09-24T17:14:40+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/guides.techimpact.org\/donor-management-systems\/security-configuration-and-customization\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/guides.techimpact.org\/donor-management-systems\/security-configuration-and-customization\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/guides.techimpact.org\/donor-management-systems\/security-configuration-and-customization\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/guides.techimpact.org\/donor-management-systems\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security, Configuration, and Customization\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/guides.techimpact.org\/donor-management-systems\/#website\",\"url\":\"https:\/\/guides.techimpact.org\/donor-management-systems\/\",\"name\":\"A Consumers Guide to Low-Cost Fundraising Software\",\"description\":\"A Consumers Guide to Low-Cost Fundraising Software\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/guides.techimpact.org\/donor-management-systems\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security, Configuration, and Customization - A Consumers Guide to Low-Cost Fundraising Software","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/guides.techimpact.org\/donor-management-systems\/security-configuration-and-customization\/","og_locale":"en_US","og_type":"article","og_title":"Security, Configuration, and Customization - A Consumers Guide to Low-Cost Fundraising Software","og_description":"Recent high-profile incidents have served to emphasize the importance of security for any system that stores personal or sensitive information about individuals and organizations. Fundraising systems are a particularly appealing target for hackers due to the extensive donor profile and &hellip; Read more","og_url":"https:\/\/guides.techimpact.org\/donor-management-systems\/security-configuration-and-customization\/","og_site_name":"A Consumers Guide to Low-Cost Fundraising Software","article_modified_time":"2020-09-24T17:14:40+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/guides.techimpact.org\/donor-management-systems\/security-configuration-and-customization\/","url":"https:\/\/guides.techimpact.org\/donor-management-systems\/security-configuration-and-customization\/","name":"Security, Configuration, and Customization - A Consumers Guide to Low-Cost Fundraising Software","isPartOf":{"@id":"https:\/\/guides.techimpact.org\/donor-management-systems\/#website"},"datePublished":"2020-09-18T17:53:32+00:00","dateModified":"2020-09-24T17:14:40+00:00","breadcrumb":{"@id":"https:\/\/guides.techimpact.org\/donor-management-systems\/security-configuration-and-customization\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/guides.techimpact.org\/donor-management-systems\/security-configuration-and-customization\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/guides.techimpact.org\/donor-management-systems\/security-configuration-and-customization\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/guides.techimpact.org\/donor-management-systems\/"},{"@type":"ListItem","position":2,"name":"Security, Configuration, and Customization"}]},{"@type":"WebSite","@id":"https:\/\/guides.techimpact.org\/donor-management-systems\/#website","url":"https:\/\/guides.techimpact.org\/donor-management-systems\/","name":"A Consumers Guide to Low-Cost Fundraising Software","description":"A Consumers Guide to Low-Cost Fundraising Software","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/guides.techimpact.org\/donor-management-systems\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/guides.techimpact.org\/donor-management-systems\/wp-json\/wp\/v2\/pages\/661"}],"collection":[{"href":"https:\/\/guides.techimpact.org\/donor-management-systems\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/guides.techimpact.org\/donor-management-systems\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/guides.techimpact.org\/donor-management-systems\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/guides.techimpact.org\/donor-management-systems\/wp-json\/wp\/v2\/comments?post=661"}],"version-history":[{"count":3,"href":"https:\/\/guides.techimpact.org\/donor-management-systems\/wp-json\/wp\/v2\/pages\/661\/revisions"}],"predecessor-version":[{"id":891,"href":"https:\/\/guides.techimpact.org\/donor-management-systems\/wp-json\/wp\/v2\/pages\/661\/revisions\/891"}],"wp:attachment":[{"href":"https:\/\/guides.techimpact.org\/donor-management-systems\/wp-json\/wp\/v2\/media?parent=661"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}