BEGIN:VCALENDAR VERSION:2.0 PRODID:-//ChamberMaster//Event Calendar 2.0//EN METHOD:PUBLISH X-PUBLISHED-TTL:P3D REFRESH-INTERVAL:P3D CALSCALE:GREGORIAN BEGIN:VTIMEZONE TZID:America/New_York BEGIN:DAYLIGHT RRULE:FREQ=YEARLY;BYMONTH=3;BYDAY=+2SU DTSTART:20070101T000000 TZOFFSETFROM:-0500 TZOFFSETTO:-0400 TZNAME:Eastern Daylight Time END:DAYLIGHT BEGIN:STANDARD RRULE:FREQ=YEARLY;BYMONTH=11;BYDAY=+1SU DTSTART:99991231T000000 TZOFFSETFROM:-0400 TZOFFSETTO:-0500 TZNAME:Eastern Standard Time END:STANDARD END:VTIMEZONE BEGIN:VEVENT DTSTART;TZID=America/New_York:20200305T130000 DTEND;TZID=America/New_York:20200319T143000 X-MICROSOFT-CDO-ALLDAYEVENT:FALSE SUMMARY:Webinar Series: Establishing Tech Policies to Protect Your Nonprofit\, a 3-part course DESCRIPTION:Three Thursdays\, March 5-March 19\, 1 to 2:30 PM EasternClear\, concise policies governing the use of technology can help protect your nonprofit against the risks of scams\, malicious software\, and bad data handling practices. Do you have guidelines in place to ensure appropriate staff use of social media? Does your staff know what to do in the event of a natural disaster such as a flood\, fire\, or ransomware attack? How do you manage staff use of phones or computers that mix personal and work data? If you don't have written policies and regular training to ensure that people understand them your organization may face bigger risks than you think. Over three 90-minute webinars\, we'll walk you through the questions you should consider as you develop policies to protect your nonprofit. Throughout this course\, you will:Identify the risks your nonprofit faces and the level of risk with which you're comfortable. Ask yourself important questions about what is and is not acceptable use of organization resources and tools. Learn to manage people and data to keep your organization safe from malicious attacks and honest mistakes. Walk through the pros and cons of whether staff members should use their personal devices for work. Consider the ways you can partner with your staff to protect organization data on personal devices. Review what you'll need to do if your office experiences a major disaster such as flood\, earthquake\, or ransomware. Gain the knowledge you need to write smart policies to protect constituents\, staff members\, and your organization.Course Schedule:All sessions take place Thursdays from 1-2:30 PM Eastern.March 5: Acceptable Use and IT Security Computers and office software are so familiar it's easy to assume that everyone knows what's OK and what's not. But that false sense of security can cause a lot of problems. This session will help you develop clear guidelines for what is and is not acceptable on organization devices and networks. We'll also provide IT security tips to guide your policy so that you're less likely to fall victim to ransomware and other malicious software. March 12: Bring Your Own Device Policies Nonprofits and staff members appreciate the convenience of being able to do work at home or on the road using a personal device. However\, without good policies\, the blurred lines between work and personal life can cause issues and put your data at risk. We'll discuss what to consider as you develop a policy for that's fair and protects your organization. March 19: Disaster Recovery The potential for disaster is everywhere. Hurricane\, flood\, tornado\, earthquake and those are just the big ones. What will you do if your systems are infected with ransomware or someone accidentally deletes important files? What about if your executive director or top IT staff leaves and takes all of their institutional knowledge (and passwords) with them? We'll walk you through the potential disasters and guide you through developing a plan that will help you get your organization back up and running as quickly and as safely as possible. Our Expert Trainer Joshua Peskay Joshua is Vice President of RoundTable Technology\, a technology service provider in in New York and Maine. He's been helping nonprofits improve their use of technology since the early 1990's and has worked with more than 1\,000 organizations. He specializes in helping organizations be strategic about their technology and make smart choices about services\, support\, and management.Important InfoIdealware will send the access code and dial-in information for the webinar to the email address you use to register. All registered participants will have access to recordings of each session. Participants who cannot attend any of the sessions due to scheduling conflicts will still have access to the course presentation decks and handouts About IdealwareIdealware is a program of the nonprofit Tech Impact. We are the authoritative source for independent\, thoroughly-researched technology resources for the social sector. Our publications\, assessments\, and training can save you time and money by providing impartial guidance that gives you the knowledge and confidence you need to decide what's best for your organization. Browse our archives\, sign up for our mailing list\, or learn more at www.idealware.org X-ALT-DESC;FMTTYPE=text/html:

Three Thursdays\, March 5-March 19\, 1 to 2:30 PM Eastern

Clear\, concise policies governing the use of technology can help protect your nonprofit against the risks of scams\, malicious software\, and bad data handling practices. Do you have guidelines in place to ensure appropriate staff use of social media? Does your staff know what to do in the event of a natural disaster such as a flood\, fire\, or ransomware attack? How do you manage staff use of phones or computers that mix personal and work data? \;

If you don&rsquo\;t have written policies&mdash\;and regular training to ensure that people understand them&mdash\; your organization may face bigger risks than you think. Over three 90-minute webinars\, we&rsquo\;ll walk you through the questions you should consider as you develop policies to protect your nonprofit. \;

Throughout this course\, you will:

Course Schedule:

All sessions take place Thursdays from 1-2:30 PM Eastern.

March 5: Acceptable Use and IT Security \;

Computers and office software are so familiar it&rsquo\;s easy to assume that everyone knows what&rsquo\;s OK and what&rsquo\;s not. But that false sense of security can cause a lot of problems. This session will help you develop clear guidelines for what is and is not acceptable on organization devices and networks. We&rsquo\;ll also provide IT security tips to guide your policy so that you&rsquo\;re less likely to fall victim to ransomware and other malicious software. \;

March 12: Bring Your Own Device Policies \;

Nonprofits and staff members appreciate the convenience of being able to do work at home or on the road using a personal device. However\, without good policies\, the blurred lines between work and personal life can cause issues and put your data at risk. We&rsquo\;ll discuss what to consider as you develop a policy for that&rsquo\;s fair and protects your organization. \;

March 19: Disaster Recovery \;

The potential for disaster is everywhere. Hurricane\, flood\, tornado\, earthquake&mdash\;and those are just the big ones. What will you do if your systems are infected with ransomware or someone accidentally deletes important files? What about if your executive director or top IT staff leaves and takes all of their institutional knowledge (and passwords) with them? We&rsquo\;ll walk you through the potential disasters and guide you through developing a plan that will help you get your organization back up and running as quickly and as safely as possible.

Our Expert Trainer &ndash\; Joshua Peskay \;

Joshua is Vice President of RoundTable Technology\, a technology service provider in in New York and Maine. He&rsquo\;s been helping nonprofits improve their use of technology since the early 1990&rsquo\;s and has worked with more than 1\,000 organizations. He specializes in helping organizations be strategic about their technology and make smart choices about services\, support\, and management.

Important Info

Idealware will send the access code and dial-in information for the webinar to the email address you use to register. All registered participants will have access to recordings of each session. Participants who cannot attend any of the sessions due to scheduling conflicts will still have access to the course presentation decks and handouts \;

About Idealware

Idealware is a program of the nonprofit Tech Impact. We are the authoritative source for independent\, thoroughly-researched technology resources for the social sector. Our publications\, assessments\, and training can save you time and money by providing impartial guidance that gives you the knowledge and confidence you need to decide what&rsquo\;s best for your organization. Browse our archives\, sign up for our mailing list\, or learn more at www.idealware.org

 \;

LOCATION: UID:e.1202.142826 SEQUENCE:3 DTSTAMP:20200706T075640Z URL:https://members.kynonprofits.org/education/Details/webinar-series-establishing-tech-policies-to-protect-your-nonprofit-a-3-part-course-159235?sourceTypeId=Hub END:VEVENT END:VCALENDAR