data protection

A board discussing a cybersecurity assessment for access to justice organizations

Cybersecurity Assessment for Access to Justice Organizations (real risks in 10 business days)

It’s 4:45 p.m. Intake is backed up. A partner asks for a file “right now.” Finance needs numbers for a funder update. Then someone forwards a strange email that looks like it came from a court address, underscoring the operational security challenges nonprofit organizations face every day. This is the real context for a cybersecurity […]

Cybersecurity Assessment for Access to Justice Organizations (real risks in 10 business days) Read More »

Stop privacy by design being an afterthought: A field memo on protecting vulnerable clients in justice nonprofits

The intake queue is exploding. A partner needs a same-day handoff. A funder report is due, and the numbers don’t reconcile. In that pressure, privacy turns into a cleanup job. A rushed form. A shared spreadsheet. A “temporary” folder that becomes permanent. For justice nonprofits serving people at real risk, that’s not just an IT

Stop privacy by design being an afterthought: A field memo on protecting vulnerable clients in justice nonprofits Read More »

A system that allows for a data security strategy for legal partner organizations

Data Security Strategy for Legal Partner Organizations (Shared Plans, No Blame)

Your intake queue is full. A referral partner needs a same-day handoff. A staff member forwards a document “just this once” to keep a client from falling through the cracks. These everyday pressures underscore the critical need for a comprehensive data security strategy. That’s how sensitive client data moves in real life, across organizations, inboxes,

Data Security Strategy for Legal Partner Organizations (Shared Plans, No Blame) Read More »

An image that represents a team reviewing a data retention policy for legal services

Data Retention Policy for Legal Services: Keep What You Need, Delete What You Should, Defend What You Keep

Your team didn’t choose legal services because you love filing systems. You chose it to help people through high-stakes moments. But the intake queue grows, staff copy and paste notes across tools, and every year brings a new report, audit, or public records question. Meanwhile, old client data sits everywhere, quietly piling up. Keeping everything

Data Retention Policy for Legal Services: Keep What You Need, Delete What You Should, Defend What You Keep Read More »

Build a practical data governance policy for justice nonprofits

Build a practical data governance policy for justice nonprofits that protects clients and satisfies funders

The intake queue is growing, a partner needs a quick data pull, and a funder report is due Friday. You open the spreadsheet, then the case system export, then the shared drive folder someone swears is “the real one.” The numbers don’t match, and no one’s sure which version is safe to share. That’s the

Build a practical data governance policy for justice nonprofits that protects clients and satisfies funders Read More »

Implementing A Cybersecurity Baseline For Justice Nonprofits (Minimum Controls That Hold Up Under Pressure)

Your team carries stories, full of sensitive data, that can’t safely “leak.” Names. Addresses. Court filings. Immigration status. Shelter locations. Notes from an intake call that someone trusted you with, once, at their worst moment. A cyber incident in a justice nonprofit isn’t just an IT problem. It can create real-world harm, put staff at

Implementing A Cybersecurity Baseline For Justice Nonprofits (Minimum Controls That Hold Up Under Pressure) Read More »

A team preserving evidence during a breach

Preserving Evidence During a Breach: A Do-Not-Break-This Checklist for Executives

Your phone rings. Someone says, “We think we’ve been breached.” In the next ten minutes, you’ll feel the pull to “fix it fast,” to secure your systems. Reset passwords. Rebuild a server. Ask a vendor to clean things up. That instinct is human. It’s also how organizations accidentally erase the very proof they’ll need to

Preserving Evidence During a Breach: A Do-Not-Break-This Checklist for Executives Read More »

An image of a computer where justice nonprofit offboarding takes place

justice nonprofit offboarding checklist: Offboarding that actually protects clients

The intake queue is already too long. A clinic is tomorrow. A funder report is due Friday. Then someone leaves, planned or not, and your team realizes the quiet risk: they still have access to client files, shared inboxes, and partner portals. Offboarding isn’t an HR formality. In legal aid, court support, and justice-serving nonprofits,

justice nonprofit offboarding checklist: Offboarding that actually protects clients Read More »

A team learning about offboarding for self help services organizations

Access Control and Offboarding for Self Help Services Organizations (Secure Forms and Portals Without Friction)

Court self-help programs, navigator teams, and legal aid style nonprofits run on motion. Part-time staff. Pro bono partners rotating in and out. Interns who start strong, then disappear when school ramps up. Vendors who “just need access for a minute.” All of it under urgent deadlines that demand effective employee offboarding. The core security risk

Access Control and Offboarding for Self Help Services Organizations (Secure Forms and Portals Without Friction) Read More »

How To Make A Robust Justice Nonprofit Security Plan: 10 controls you can put in place in 90 days

It’s 4:45 p.m. on a Friday. Intake is still piling up. A partner email comes in with a spreadsheet attached, full of names, birthdates, and case notes. Someone forwards it to “whoever can help.” On Monday, a funder report is due, and the numbers don’t match. Meanwhile, you’re thinking a quieter thought you don’t love

How To Make A Robust Justice Nonprofit Security Plan: 10 controls you can put in place in 90 days Read More »