KRFM Consulting, LLC
Privacy Policy
Our Privacy Policy was last updated on October 14th, 2024.
1.1 Fundraising University (“Company,” or “we,” or “us,” or “our”) is committed to safeguarding the privacy of our application and service users (“users,” or “you”).
1.2 This policy applies where we are acting as a data controller with respect to your personal data, in other words, where we determine the purposes and means of the processing of that personal data.
1.3 Terms of Service. Use of the Company Service is subject to the terms of our Terms of Service through our online form, which is hereby incorporated and made part of this Privacy Policy. By using the Company Service, you agree to be bound by our Terms of Service.
1.4 Your use of the Company Service is subject to the terms and conditions set forth in this Privacy Policy (the “Privacy Policy”).
1.5 We continually strive to find new ways to enhance your experience with the Company Service and we may modify this Privacy Policy from time to time to reflect changes in our privacy practices. You are encouraged to review this Privacy Policy periodically and to check the “Last Updated” date at the top of the Privacy Policy for the most recent version. If we make changes to this Privacy Policy, we will notify you here, by email, or by means of notice through the application, the Application, or any other part of the Company Service.
PLEASE READ THIS PRIVACY POLICY CAREFULLY. BY ACCESSING OR USING THE COMPANY SERVICE, YOU ACKNOWLEDGE THAT YOU HAVE READ, UNDERSTAND, AND AGREE TO BE BOUND BY ALL THE TERMS OF THIS PRIVACY POLICY AND OUR TERMS OF SERVICE. IF YOU DO NOT AGREE TO SUCH TERMS, EXIT THIS PAGE AND DO NOT ACCESS OR USE THE COMPANY SERVICE.
- Types and Uses of Collected Information. Company collects two types of information about you:
2.1 Personally Identifiable Information. Personally Identifiable Information is information that identifies a specific person. When you engage in certain activities via the Company Service, including but not limited to creating an account, sending feedback, or otherwise participating in the Company Service (collectively, “Identification Activities”), we may ask you to provide certain information about yourself. If you elect to engage in an Identification Activity we may ask you to provide us with certain personal information about yourself, such as your name, email address (for receipt purposes only), credit card information, telephone number and/or any other information you provide to us, to process your transaction,, and populate forms for future transactions. When you enroll in the Company Service, we may also ask you to provide us with additional information, such as credit card information. Depending on the Identification Activity, some of the information we ask you to provide may be identified as mandatory and some identified as voluntary. If you do not provide mandatory information for an Identification Activity, you will not be permitted to engage in that Identification Activity with the Company Service. Depending on the Identification Activity, Company might not re-ask you for Personally Identifiable Information if such are already stored with us.
We DO NOT USE OR SHARE Personally Identifiable Information to provide products and/or services to you, nor do we share to to Third-Party advertisers to provide products and/or services to you, administer sweepstakes and contests, enhance the operation of the Company Service, improve our marketing and promotional efforts, analyze use of the Company Service, improve the Company Service, and tailor your experience with third parties as provided below in this Privacy Policy. We MAY USE Personally Identifiable Information to troubleshoot, resolve disputes, accomplish administrative tasks, contact you, enforce our agreements with you, including our Terms of Service and this Privacy Policy, comply with applicable law, and cooperate with law enforcement activities.
2.2 Non-Personally Identifiable Information. Non-Personally Identifiable Information is information that does not identify a specific person. This type of information may include things like the Uniform Resource Locator (“URL”) of the application you visited before coming to the Company Service or otherwise participating in the Company Service, the URL of the application you visit after leaving the Company Service, the type of browser you are using, your Internet Protocol (“IP”) address, mobile carrier information, mobile device information, or general and/or aggregated location data that does constitute Personally Identifiable Information. We, and/or our authorized Third-Party Service Providers, may automatically collect this information when you use the Company Service using electronic tools like Cookies and Web beacons or Pixel tags, as described below in this Privacy Policy. Most of the other information we collect for mobile, such as your mobile device identification and mobile device type, the request type, your mobile carrier, your mobile carrier user identification, and the content of your request, does not by itself identify you to Company, though it may be unique or consist of or contain information that you consider personal. We use Non-Personally Identifiable Information to troubleshoot, administer the Company Service, analyze trends, gather demographic information, comply with applicable law, and cooperate with law enforcement activities.
- How we use your personal data.
3.1 In this Section 2 we have set out:
(a) the general categories of personal data that we may process;
(b) the purposes for which we may process personal data; and
(c) the legal bases of the processing.
3.2 We may process data about your use of our application and services (“usage data”). The usage data may include your IP address, geographical location, browser type and version, operating system, referral source, length of visit, page views and application navigation paths, as well as information about the timing, frequency and pattern of your service use]. The source of the usage data is our analytics tracking system. This usage data may be processed for the purposes of analyzing the use of the application and services. The legal basis for this processing is your consent or our legitimate interests, namely monitoring and improving our application and services.
3.3 We may process your account data (“account data”). The account data may include your name and email address. The source of the account data is you. The account data may be processed for the purposes of operating our application, providing our services, ensuring the security of our application and services, maintaining back-ups of our databases and communicating with you. The legal basis for this processing is your consent or our legitimate interests, namely monitoring and improving our application and services.
3.4 We may process your information included in your personal profile on our application (“profile data”). The profile data may include your name, telephone number, email address, profile pictures, and gender. The profile data may be processed for the purposes of enabling and monitoring your use of our application and services. The legal basis for this processing is your consent or our legitimate interests, namely monitoring and improving our application and services.
3.5 We may process information that you post for publication on our application or through our services (“publication data”). The publication data may be processed for the purposes of enabling such publication and administering our application and services. The legal basis for this processing is your consent or our legitimate interests, namely monitoring and improving our application and services.
3.6 We may process information contained in any inquiry you submit to us regarding goods and/or services (“inquiry data”). The inquiry data may be processed for the purposes of offering, marketing and selling relevant goods and/or services to you. The legal basis for this processing is your consent or our legitimate interests, namely monitoring and improving our application and services.
3.7 We may process information relating to transactions, including purchases of goods and services, that you enter into with us and/or through our application (“transaction data”). The transaction data may include first and last names, credit card number and a password. The transaction data may be processed for the purpose of supplying the purchased goods and services and keeping proper records of those transactions. The legal basis for this processing is the performance of a contract between you and us and/or taking steps, at your request, to enter into such a contract and our legitimate interests.
3.8 We may process information contained in or relating to any communication that you send to us (“correspondence data”). The correspondence data may include the communication content and metadata associated with the communication. Our application will generate the metadata associated with communications made using the application contact forms. The correspondence data may be processed for the purposes of communicating with you and record-keeping. The legal basis for this processing is your consent or our legitimate interests, namely monitoring and improving our application and services.
3.9 We may process any of your personal data identified in this policy where necessary for the establishment, exercise or defense of legal claims, whether in court proceedings or in an administrative or out-of-court procedure. The legal basis for this process is our legitimate interests, namely the protection and assertion of our legal rights, your legal rights and the legal rights of others.
3.10 In addition to the specific purposes for which we may process your personal data set out in this Section 2, we may also process any of your personal data where such processing is necessary for compliance with a legal obligation to which we are subject, or in order to protect your vital interests or the vital interests of another natural person.
3.11 Please do not supply any other person’s personal data to us unless we prompt you to do so.
- Providing your personal data to others
4.1 We may disclose your personal data to any member of our group of companies, this means our subsidiaries, our ultimate holding company and all its subsidiaries insofar as reasonably necessary for the purposes, and on the legal bases, set out in this policy.
4.2 Financial transactions relating to our application and services may be handled by our payment services providers. We will share transaction data with our payment services providers only to the extent necessary for the purposes of processing your payments, refunding such payments and dealing with complaints and queries relating to such payments and refunds.
4.3 In addition to the specific disclosures of personal data set out in this Section 3, we may disclose your personal data where such disclosure is necessary for compliance with a legal obligation to which we are subject, or in order to protect your vital interests or the vital interests of another natural person. We may also disclose your personal data where such disclosure is necessary for the establishment, exercise or defense of legal claims, whether in court proceedings or in an administrative or out-of-court procedure.
- About cookies
5.1 A cookie is a file containing an identifier (a string of letters and numbers) that is sent by a web server to a web browser and is stored by the browser. The identifier is then sent back to the server each time the browser requests a page from the server.
5.2 Cookies may be either “persistent” cookies or “session” cookies: a persistent cookie will be stored by a web browser and will remain valid until its set expiry date, unless deleted by the user before the expiry date; a session cookie, on the other hand, will expire at the end of the user session, when the web browser is closed.
5.3 Cookies do not typically contain any information that personally identifies a user, but personal information that we store about you may be linked to the information stored in and obtained from cookies.
5.4 We use cookies for the following purposes:
(a) authentication – we use cookies to identify you when you visit our application and as you navigate our application.
(b) status – we use cookies to help us to determine if you are logged into our application.
(c) personalization – we use cookies [to store information about your preferences and to personalize the application for you.
(d) security – we use cookies as an element of the security measures used to protect user accounts, including preventing fraudulent use of login credentials, and to protect our application and services generally.
(f) analysis – we use cookies [to help us to analyze the use and performance of our application and services; and
(g) cookie consent – we use cookies to store your preferences in relation to the use of cookies more generally.
- Cookies used by our service providers
6.1 Our service providers use cookies and those cookies may be stored on your computer when you visit our application.
6.2 We use Google Analytics to analyze the use of our application. Google Analytics gathers information about application use by means of cookies. The information gathered relating to our application is used to create reports about the use of our application. Google’s privacy policy is available at: https://www.google.com/policies/privacy/.
- Managing cookies
7.1 Most browsers allow you to refuse to accept cookies and to delete cookies. The methods for doing so vary from browser to browser, and from version to version. You can however obtain up-to-date information about blocking and deleting cookies via these links:
(a) https://support.google.com/chrome/answer/95647?hl=en (Chrome);
(b) https://support.mozilla.org/en-US/kb/enable-and-disable-cookies-application-preferences (Firefox);
(c) http://www.opera.com/help/tutorials/security/cookies/ (Opera);
(d) https://support.microsoft.com/en-gb/help/17442/windows-internet-explorer-delete-anage-cookies (Internet Explorer);
(e) https://support.apple.com/kb/PH21411 (Safari); and
(f) https://privacy.microsoft.com/en-us/windows-10-microsoft-edge-and-privacy (Edge).
7.2 Blocking all cookies will have a negative impact upon the usability of many applications.
7.3 If you block cookies, you will not be able to use all the features on our application.
- Security of Information. If you access your account via a third-party site or service, you may have additional or different sign-in protections via that third-party site or service. You need to prevent unauthorized access to your account and Personal Information by selecting and protecting your password and/or other sign-in mechanism appropriately and limiting access to your computer, browser, or mobile device by signing off after you have finished accessing your account. Unauthorized entry or use, hardware or software failure, and other factors, may compromise the security of user information at any time. If we believe that the security of your information may have been compromised, we may seek to notify you of that development. In addition, your Personally Identifiable Information resides on a secure server that only selected personnel and contractors have access to. We may encrypt certain sensitive information using Secure Socket Layer (SSL) technology to ensure that your Personally Identifiable Information is safe as it is transmitted to us.
- Analytics
We continuously improve our applications and our products, and we utilize different third-party web analytics tools to help us do so. We are interested in how visitors use our applications, our desktop tools, our mobile applications, what they like and dislike, and where they have problems. Our products, desktop tools and mobile applications use analytical tools to understand feature usage patterns, to enhance and improve your product experience and offer you specific usage tips and guidance. In connection with normal business operations, as well as to increase functionality and enhance your user experience, this usage information may be linked to personal information that we have about individual users. We maintain ownership of this data and we do not share this type of data about individual users with third parties.
This information is used solely to assist us in maintaining more effective and useful applications and products for our customers. This data will not be shared with third parties without your prior consent or unless required by law.
- Your rights
10.1 In this Section we have summarized the rights that you have under data protection law. Some of the rights are complex, and not all of the details have been included in our summaries. Accordingly, you should read the relevant laws and guidance from the regulatory authorities for a full explanation of these rights.
10.2 Your principal rights under data protection law are:
(a) the right to access;
(b) the right to rectification;
(c) the right to erasure;
(d) the right to restrict processing;
(e) the right to object to processing;
(f) the right to data portability;
(g) the right to complain to a supervisory authority; and
(h) the right to withdraw consent.
10.3 You have the right to confirm as to whether or not we process your personal data and, where we do, access to the personal data, together with certain additional information. That additional information includes details of the purposes of the processing, the categories of personal data concerned and the recipients of the personal data. Providing the rights and freedoms of others are not affected, we will supply to you a copy of your personal data. The first copy will be provided free of charge, but additional copies may be subject to a reasonable fee. You can access your personal data by visiting your profile when logged in.
10.4 You have the right to have any inaccurate personal data about you rectified and, taking into account the purposes of the processing, to have any incomplete personal data about you completed.
10.5 In some circumstances you have the right to the erasure of your personal data without undue delay, and at the latest within one month of receiving your valid request. Those circumstances include: the personal data are no longer necessary in relation to the purposes for which they were collected or otherwise processed; you withdraw consent to consent-based processing; you object to the processing under certain rules of applicable data protection law; the processing is for direct marketing purposes; and the personal data have been unlawfully process. However, there are exclusions of the right to erasure. The general exclusions include where processing is necessary: for exercising the right of freedom of expression and information; for compliance with a legal obligation; or for the establishment, exercise or defense of legal claims.
10.6 In some circumstances you have the right to restrict the processing of your personal data. Those circumstances are: you contest the accuracy of the personal data; processing is unlawful, but you oppose erasure; we no longer need the personal data for the purposes of our processing, but you require personal data for the establishment, exercise or defense of legal claims; and you have objected to processing, pending the verification of that objection. Where processing has been restricted on this basis, we may continue to store your personal data. However, we will only otherwise process it: with your consent; for the establishment, exercise or defense of legal claims; for the protection of the rights of another natural or legal person; or for reasons of important public interest.
10.7 You have the right to object to our processing of your personal data on grounds relating to your particular situation, but only to the extent that the legal basis for the processing is that the processing is necessary for: the performance of a task carried out in the public interest or in the exercise of any official authority vested in us; or the purposes of the legitimate interests pursued by us or by a third party. If you make such an objection, we will cease to process the personal information unless we can demonstrate compelling legitimate grounds for the processing which override your interests, rights and freedoms, or the processing is for the establishment, exercise or defense of legal claims.
10.8 You have the right to object to our processing of your personal data for scientific or historical research purposes or statistical purposes on grounds relating to your particular situation, unless the processing is necessary for the performance of a task carried out for reasons of public interest.
10.10 To the extent that the legal basis for our processing of your personal data is:
(a) consent; or
(b) that the processing is necessary for the performance of a contract to which you are party or in order to take steps at your request prior to entering into a contract, and such processing is carried out by automated means, you have the right to receive your personal data from us in a structured, commonly used and machine-readable format. However, this right does not apply where it would adversely affect the rights and freedoms of others.
10.11 If you consider that our processing of your personal information infringes data protection laws, you have a legal right to lodge a complaint with a supervisory authority responsible for data protection. You may do so in the EU member state of your habitual residence, your place of work or the place of the alleged infringement.
10.12 To the extent that the legal basis for our processing of your personal information is consent, you have the right to withdraw that consent at any time. Withdrawal will not affect the lawfulness of processing before the withdrawal.
- Children.
The Company Service is not directed to people under the age of thirteen (13) without parental consent. If you become aware that your child has provided us with personal information without your consent, please contact us at the email address listed below. If we become aware that a child under thirteen (13) has provided us with personal information, we take steps to remove such information and terminate the child’s account.
- Retaining and deleting personal data
12.1 This Section 12 sets out our data retention policies and procedures, which are designed to help ensure that we comply with our legal obligations in relation to the retention and deletion of personal data.
12.2 Personal data that we process for any purpose or purposes shall be kept until such time as we receive a request for deletion from you.
12.3 Notwithstanding the other provisions of this Section 12, we may retain your personal data where such retention is necessary for compliance with a legal obligation to which we are subject, or in order to protect your vital interests or the vital interests of another natural person.
- Notice of Privacy Rights to California Residents. California law requires that we provide you with a summary of your privacy rights under the California Online Privacy Protection Act (“COPPA”) and the California Business and Professions Code. As required by COPPA, we will provide you with the categories of Personally Identifiable Information that we collect through the Company Service and the categories of third party persons or entities with whom such Personally Identifiable Information may be shared for direct marketing purposes at your request. California law requires us to inform you, at your request, (1) the categories of Personally Identifiable Information we collect and what third parties we share that information with; (2) the names and addresses of those third parties; and (3) examples of the products marketed by those companies. COPPA further requires us to allow you to control who you do not want us to share that information with. To obtain this information, please send a request by email or physical mail to the address found below. When contacting us, please indicate your name, address, email address, and what Personally Identifiable Information you do not want us to share with our marketing partners. The request should be sent to the attention of our legal department and labeled “California Customer Choice Notice.” Please allow 30 days for a response. Also, please note that there is no charge for controlling the sharing of your Personally Identifiable Information or requesting this notice.
- Breach Response Plan
- Overview
This policy mandates that any individual who suspects that a theft, breach or exposure of KFRM LLC – Fundraising University Protected or Sensitive information has occurred must immediately provide a description of what occurred via email to support@fundraisingu.net or by calling (602) 529-8293. This email address and phone number are monitored and communicated to the KFRM LLC – Fundraising University’s PPO (Principal Privacy Officer). They will investigate all reported thefts, data breaches and exposures to confirm if a theft, breach or exposure has occurred. If a theft, breach or exposure has occurred, the PPO will follow the appropriate procedure in place.
- Purpose
The purpose of the policy is to establish the goals and the vision for the breach response and notification process. This policy will clearly define to whom it applies and under what circumstances, and it will include the definition of a breach, staff roles and responsibilities, standards and metrics (e.g., to enable prioritization of the incidents), as well as reporting, remediation, and feedback mechanisms. The policy shall be well publicized and made easily available to all personnel whose duties involve information privacy and security protection.
KFRM LLC – Fundraising University’s intentions for publishing a Breach Response and Notification Policy are to focus significant attention on information security and information security breaches, and how KFRM LLC – Fundraising University’s established culture of openness, trust and integrity should respond to such activity. _ KFRM LLC – Fundraising University Information Security is committed to protecting KFRM LLC – Fundraising University’s employees, partners and the company from illegal or damaging actions by individuals, either knowingly or unknowingly.
- Scope
This policy applies to all who collect, access (or have access to), maintain, distribute, process, protect, store, use, transmit, dispose of, or otherwise handle non-public (NPI) or personally identifiable (PII) of KFRM LLC – Fundraising University_ and/or its clients. Any agreements with vendors will contain language similar and/or reference this policy, with attestations as to have read, understand and agree to comply with the same.
- Policy
Confirmed theft, data breach or exposure of KFRM LLC – Fundraising University Protected or Sensitive information
As soon as a theft, data breach or exposure containing KFRM LLC – Fundraising University Protected or Sensitive information is identified, the process of removing all access to that resource will begin.
The PPO will chair an incident response team to handle the breach or exposure.
The team will include, where applicable, members from:
IT Infrastructure
IT Applications
Finance
Legal
Communications
Client/Customer Services (if customer data is affected)
Human Resources
The affected unit and/or department that uses the involved system or output or whose information may have been breached or exposed
Additional units/departments based on the information type involved
Additional individuals as deemed necessary by the PPO.
Confirmed theft, breach or exposure of KFRM LLC – Fundraising University
The PPO will be notified of the theft, breach or exposure. IT, along with the designated forensic team, will analyze the breach or exposure to determine the root cause.
Notification by any third party provider engaged by KFRM LLC – Fundraising University who collects, accesses (or has access to), maintains, distributes, processes, protects, stores, uses, transmits, disposes of, or otherwise handles non-public (NPI) or personally identifiable (PII) to the PPO of the theft, breach or exposure is a requirement of doing business with KFRM LLC – Fundraising University . The PPO will treat this the same as if it were a breach of KFRM LLC – Fundraising University ; effectively this is out-sourcing the work while in-sourcing the liability. All policies and procedures relating thereto will be followed.
Develop a communication plan.
Work with KFRM LLC – Fundraising University communications, legal and human resource departments to decide how to communicate the breach to: a) internal employees, b) the public, and c) those directly affected.
As required by relevant laws and regulations, notification of a breach, and the potential, or realized, exposure of NPI/PII, to clients/customers is required.
Any breach to a third party provider, and who, as required, notified the PPO will, like any breach to KFRM LLC – Fundraising University will require a Communication Plan per this section. The responsibility for the third party provider is to notify KFRM LLC – Fundraising University if they’ve suffered, or believed to have suffered, a data breach. KFRM LLC – Fundraising University is still liable to disclose the breach to its customers. The responsibility for the third party provider is to notify KFRM LLC – Fundraising University if they’ve suffered, or believed to have suffered, a data breach. KFRM LLC – Fundraising University is still liable to the disclosure of the breach to its customers/clients.
Ownership and Responsibilities
Custodians are those members of the KFRM LLC – Fundraising University team that have primary responsibility for maintaining any particular information resource. Custodians may be designated by any KFRM LLC – Fundraising University Executive in connection with their administrative responsibilities, or by the actual custody, collection, development, or storage of information.
Principal Privacy Officer is the member of the KFRM LLC – Fundraising University team, designated by Senior Management, who provides administrative support for the implementation, oversight and coordination of security procedures and systems with respect to specific information resources in consultation with the relevant Custodians.
Users include virtually all KFRM LLC – Fundraising University stakeholders to the extent they have authorized access to information resources, and may include KFRM LLC – Fundraising University employees, contractors, consultants, interns, temporary employees and volunteers.
The Incident Response Team shall be Senior Management and may include, but will not be limited to, the following departments or their representatives:
IT- Infrastructure, IT-Application Security, Communications, Legal, Management, Financial Services, Client/Customer Services and Human Resources.
Delay of Notification
Authorized for Law Enforcement Purposes. If a law enforcement official states to the Covered Entity or a business associate that a notification, notice, or posting would impede a criminal investigation or cause damage to national security, the Covered Entity or a business associate shall:
If the statement is in writing and specifies the time for which a delay is required, delay such notification, notice, or posting for the time period specified by the official; or
If the statement is made orally, document the statement, including the identity of the official making the statement, and delay the notification, notice, or posting temporarily and no longer than 30 days from the date of the oral statement, unless a written statement as described above is submitted during that time.
Definitions
Breach – Breach means the acquisition, access, use, or disclosure of Non-Public or Personally Identifiable in a manner not permitted under relevant laws or regulations, which compromises the security or privacy of the protected information. Breach excludes:
Any unintentional acquisition, access, or use of protected information by a workforce member or person acting under the authority of a covered entity or business associate if such acquisition, access, or use was made in good faith and within the scope of authority and does not result in further use or disclosure in a manner not permitted under governing law and/or regulation.
Any inadvertent disclosure by a person who is authorized to access protected information at a covered entity or business associate to another person authorized to access NPI or PII at the same covered entity or business associate, or organized arrangement in which the covered entity participates, and the information received as a result of such disclosure is not further used or disclosed in a manner not permitted under governing law and/or regulation.
A disclosure of protected information where a covered entity or business associate has a good faith belief that an unauthorized person to whom the disclosure was made would not reasonably have been able to retain such information.
Business Associate – A “business associate” is a person or entity that performs certain functions or activities that involve the use or disclosure of protected information (NPI or PII) on behalf of, or provides services to, a covered entity. A member of the covered entity’s workforce is not a business associate.
Covered Entity – For NPI, covered entities are any person operating under or required to operate under a license, registration, charter, certificate, permit, accreditation or similar authorization under the Banking Law, the Insurance Law or the Financial Services Law. For PII, any organization, individual and/or individuals who use, store, destroy, transmit, copy, etc. Personally Identifiable Information.
Encryption or encrypted data – The most effective way to achieve electronic information security. To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it. Unencrypted data is called plain text;
Plain text – Unencrypted data.
Hacker – A slang term for a computer expert/enthusiast with demonstrated skills in programming languages, computer systems and social engineering, and can often be considered an expert on the subject(s).
Non-Public Information (NPI) – Defined as all electronic information that is not publicly available information and is:
Business-related information
Information concerning an individual, which, because of name, number, personal mark or other identifier, can be used to identify such an individual when combined with SSN, driver’s license, account number, security code or biometric records
Personally Identifiable Information (PII) – Any information that can be used to contact, locate or identify a specific individual, either by itself or combined with other sources that are easily accessed. It can include information that is linked to an individual through financial, medical, educational or employment records. Some of the data elements that might be used to identify a certain person could consist of fingerprints, biometric data, a name, telephone number, email address or social security number. Safeguarding PII and other sensitive information is the responsibility of federal agencies.
Protected information – See NPI or PII
Information Resource – The data and information assets, both physical and electronic, of an organization, department or unit.
Safeguards – Countermeasures, controls put in place to avoid, detect, counteract, or minimize security risks to physical property, information, computer systems, or other assets. Safeguards help to reduce the risk of damage or loss by stopping, deterring, or slowing down an attack against an asset.
Sensitive information – Information that is encrypted or in plain text and contains NPI or PII. See NPI or PII above.
- Enforcement
Any KFRM LLC – Fundraising University personnel found in violation of this policy may be subject to disciplinary action, up to and including termination of employment.
Any third party partner company found in violation may have their network connection terminated and/or our relationship severed; the terms of the same to be defined in the Agreement memorializing such relationship.
- Who can I ask if I have additional questions?For additional inquiries about the privacy of your information, you can contact us by emailing us at support@fundraisingu.net.