Individuals provide information by contacting us or donating to us via our website, via email, by phone, or by registering for one of our events.
The types of donor information that we collect and maintain:
- Contact information: name, organization/company, complete address, phone number, and email address
- Donation information: amounts donated, date of donation(s), and method
- Volunteer hours
We do not track, collect, or distribute personal information entered by those who visit our website.
How Information Is Used
JFCS uses collected data to maintain records of donations, send acknowledgements, mail year-end tax statements, manage event participation and areas of interest, and send newsletters, notices, and direct mail pieces. We add individuals to our mailing list unless requested otherwise (see below).
We may list corporations, foundations, and individual names in our Annual Report or other donor listings, unless the request is made to be recognized anonymously.
Credit card numbers are NOT retained once processed. Donations over 2% of our entire budget must be reported on IRS Form 990, Schedule B.
We use website statistics to analyze our website usage. JFCS will not sell, rent, trade, or transfer our donors’ personal information to outside organizations. Use of donor information will be limited to the internal purposes of JFCS and only to further the agency’s mission.
Online Donation Security
JFCS online donation forms are provided by Donor Perfect. When making an online donation, donors will be asked to provide their name as well as contact and credit card information. All information is encrypted using SSL, an industry standard secure technology. This encryption is designed to prevent the theft or interception of the information provided.
JFCS contracts with Donor Perfect to provide hosting services for our database. The Donor Perfect data server provides data protection meeting PCI DSS (Payment Card Industry Data Security Standard), encrypted communication via SSL (Secure Sockets Layer) technology, intrusion detection for all devices and network nodes, state-of-the-art firewall infrastructure that detects malicious application attacks, virus protection, network load balancing devices via Citrix, and patch management, security and vulnerability monitoring and tracking, and SQL server attack protection via applications to detect SQL Injection and Cross Site Scripting Attacks.
If you would like to update or correct your contact information, or remove your name from our donor database, contact Liam Mulshine, Development Assistant, at 215.356.1912 or email@example.com.