03.01.2015 Views

WealthEngine Best Practices in Higher Education for Prospect ...

WealthEngine Best Practices in Higher Education for Prospect ...

WealthEngine Best Practices in Higher Education for Prospect ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Best</strong> <strong>Best</strong> <strong>Practices</strong> <strong>Practices</strong> <strong>in</strong> Action<br />

10<br />

Ma<strong>in</strong>ta<strong>in</strong> Ethics and the Security of<br />

Your <strong>Prospect</strong>/Donor In<strong>for</strong>mation<br />

The privacy of data is vital to an organization’s success.<br />

In any organization, it is imperative all data perta<strong>in</strong><strong>in</strong>g<br />

to donors, philanthropic prospects, students, parents of<br />

students, alumni, and others is protected and privacy is<br />

ma<strong>in</strong>ta<strong>in</strong>ed at the highest level. Sixty-seven percent of<br />

survey respondents have a security and privacy policy <strong>in</strong><br />

place, jump<strong>in</strong>g to 82% <strong>for</strong> HPOs.<br />

A security policy should outl<strong>in</strong>e data handl<strong>in</strong>g procedures<br />

with<strong>in</strong> the fundrais<strong>in</strong>g entity, when work<strong>in</strong>g with vendors,<br />

as well as processes <strong>for</strong> communicat<strong>in</strong>g proper data<br />

handl<strong>in</strong>g procedures throughout the education <strong>in</strong>stitution.<br />

The security policy should outl<strong>in</strong>e:<br />

Who will have access to data<br />

What types of data are available<br />

Data entry procedures to ensure data is factual,<br />

verifiable, reliable and relevant<br />

Data storage policies<br />

Secure data transfer methods<br />

Ethical guidel<strong>in</strong>es<br />

Security policies should comply with all federal, state and<br />

local laws. In addition, they should comply with the Family<br />

<strong>Education</strong>al Rights and Privacy Act 1 (FERPA), which governs<br />

record keep<strong>in</strong>g with<strong>in</strong> educational <strong>in</strong>stitutions. (See box on<br />

page 26 <strong>for</strong> more on FERPA). Policies should be reviewed<br />

frequently to address changes <strong>in</strong> technology, data handl<strong>in</strong>g<br />

methods, as well as <strong>in</strong>stitutional rules and all relevant laws.<br />

An organization’s security policy should ensure that data<br />

storage/transfer methods are also covered <strong>for</strong> the follow<strong>in</strong>g:<br />

Databases (centralized and/or decentralized)<br />

Peripheral documents/data such as correspondence,<br />

research and vendor supplied <strong>in</strong><strong>for</strong>mation<br />

Internal communications<br />

Staff <strong>in</strong>teractions via phone, email, and social media<br />

Ethics<br />

All development staff and fundrais<strong>in</strong>g volunteers should<br />

abide by one or more of the ethical guidel<strong>in</strong>es set <strong>for</strong>th<br />

by the Council <strong>for</strong> Advancement and Support of<br />

<strong>Education</strong> (CASE), the Association of Fundrais<strong>in</strong>g<br />

Professionals (AFP) and the Association of Professional<br />

Researchers <strong>for</strong> Advancement (APRA). In addition to<br />

follow<strong>in</strong>g the ethical guidel<strong>in</strong>es of these organizations, it<br />

is important to def<strong>in</strong>e <strong>in</strong>ternal ethical guidel<strong>in</strong>es and make<br />

certa<strong>in</strong> all staff abide by the policy.<br />

The primary responsibilities <strong>for</strong> fundrais<strong>in</strong>g <strong>in</strong>stitutions are<br />

to ensure all staff and fundrais<strong>in</strong>g volunteers hav<strong>in</strong>g access<br />

to sensitive <strong>in</strong><strong>for</strong>mation are attentive to the confidentiality<br />

and privacy of its donors, prospects, staff, students and<br />

their personal <strong>in</strong><strong>for</strong>mation, that they are accountable <strong>for</strong><br />

proper use of said <strong>in</strong><strong>for</strong>mation, that staff make no false<br />

representations of themselves or their <strong>in</strong>stitution, nor enter<br />

<strong>in</strong>to a situation where any conflict of <strong>in</strong>terest would occur.<br />

Protect the reputation of your <strong>in</strong>stitution by carefully<br />

adher<strong>in</strong>g to the various ethical guidel<strong>in</strong>es relevant to your<br />

operation. A security breach could result <strong>in</strong> professional<br />

sanctions and/or the loss of confidence of your constituents.<br />

Every organization should be aware of the potential<br />

pitfalls of a security breach and should proactively <strong>in</strong>stitute<br />

a security policy if they don’t have one <strong>in</strong> place already.<br />

Security policies should be updated on a regular basis.<br />

Bottom L<strong>in</strong>e: An up-to-date and comprehensive<br />

security policy is a must <strong>for</strong> all higher education<br />

<strong>in</strong>stitutions.<br />

1 http://www.ed.gov/legislation/FedRegister/f<strong>in</strong>rule/2008-4/120908a.pdf<br />

<strong>Best</strong> <strong>Practices</strong> <strong>for</strong> <strong>Prospect</strong> Research <strong>in</strong> <strong>Higher</strong> <strong>Education</strong> Fundrais<strong>in</strong>g - 2nd Ed. | 37

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!