You are on page 1of 1
Data Security Procedures artments This Procedure alms to: Set out practical guidelines on the Data Protection Indicate your respansibilities in relation to the processing of personal data; Prevent unfair or unlawful processing of personal data unauthorized retention, disclosure, modification or destruction, Procedure: a.Copies of all documents containing constituent information, including but nat limited to: agreements, endowment agreements, memorandums of agreement, pledge forms, credit card information, giving reports, mailing lists, donor profiles, financial statements, contact reports, contact reminders, customized database reports, and private correspondence must be destroyed immediately after use for intended purpose. Original documents must be returned tothe ~— administrator as. soon as practical b. Constituent information will always be secure; not available on a desktop or otherwise accessible or in the open when the user is away from their office or the information. Shared file cabinets containing constituent files will be locked at the end of the day or when a minimum of one staff person is not in the immediate vicinity of the files. 4. Offices will be locked at the end of the day or when a staff person is away for an extended period of time during the day.

You might also like