Technology Decision Makers

last person joined: yesterday 

A group for those in nonprofit IT decision-making roles to connect with peers and share best practices. This Technology Decision Makers group is for nonprofit IT or MIS Directors/Managers as well as CIOs and CTOs to connect with their peers and share best practices. Topics for discussion include, but are not limited to: hardware and software management, product reviews, emerging technology, best practices, collaborating effectively with other departments, and management conundrums. Membership is restricted to IT staff at nonprofit organizations.

Volunteers

  • 1.  Volunteers

    Posted Jul 24, 2018 13:20
    ​Good morning,
    Does anyone have specific protocols or documents regarding IT access for volunteers?  We are starting a program and I'm curious as to what others already have in place from an IT perspective.

    Do you give them e-mail?
    How much access to you restrict?
    Do you complete background checks?

    These are primarily office workers.

    Thanks tons!

    ------------------------------
    Melissa Berrett
    Director of IT
    Oregon Health and Science University Foundation
    Portland, OR
    ------------------------------


  • 2.  RE: Volunteers

    Posted Jul 25, 2018 11:07
    We've written policies for different organizations regarding volunteers. I'll note that in addition to the usual, there are GDPR implications for using volunteers.

    Generally, this is what we've gone with:
    - Background checks only required when there will be interaction with service recipients, not for office-based staff
    - Email access is typically not a policy-level decision, but is determined based on the needs of the role. Most service staff don't need org email addresses, but most office staff do. Provisioning of email addresses typically requires signing off on sections we copy from the employee handbook governing acceptable use of IT systems.
    - Policy over access is 'to limit access to systems only to those which are required for the volunteer role, and to limit access to information within those systems to only that information which is necessary, to the extent possible within each given system. If volunteers will have access to sensitive, private or confidential information, volunteers will be required to sign a confidentiality agreement.'

    ------------------------------
    Isaac Shalev
    http://www.sage70.com
    Stamford CT
    @Sage70
    isaac@sage70.com
    ------------------------------