We believe in data privacy & security
We feel strongly about privacy, security and transparency. At every level of what we do, we take appropriate steps to protect data, undertaking with our partners to keep privacy and security a top priority in our operations.
Data Privacy & Security
Rights we respect
Standards we protect
We never charge a card, digital wallet or bank account without authorization. Our security safeguards protect all purchases and payments, ensuring that confidential information is never vulnerable.
Practices we expect
When faced with unanticipated tech issues or security concerns, we react. We mobilize immediately to tackle the issues and find responsible solutions.
Priorities we project
The Full Story
How is private data handled so that everyone can be sure it stays private?
Nothing is more significant to us than the goodwill of donors and vitality of the nonprofits they support. That is why we spare no effort to ensure data privacy in accordance with the law, best practices and what is right.
First and foremost, we and our nonprofit members never directly see or store any donor payment information. (Saved payment details are captured by and stored securely in a third-party payment processor without passing through our servers. Upon request, we can work with the payment processor to delete that data.)
With any data we do collect and retain, we take every reasonable action to protect against its loss or misuse, both in transit and at rest. While in transit, it is protected using end-to-end encryption and SSL protected web pages (see more below). At rest, it resides in encrypted databases. Most importantly, we only store data for as long as required, and, critically, we will never sell, rent or lease it to third parties.
Other personal payment data may be passed through to partners for the purpose of processing donations.
For more about individual nonprofits’ privacy policies and how they use and protect personal data, contact the nonprofits directly. For more about some of our partners, see more about our partners’ security below.
In terms of hardware, our website and technology are hosted by Amazon Web Services (see more below), a robust and reliable platform that ensures continuous operations, round-the-clock support and top-quality security, including firewalls, encryption, monitoring, penetration testing and more. Learn more about AWS security.
Industry-standard safe practices
What kinds of measures ensure the complete security of Give Lively’s fundraising technology?
More about our tech partners’ security
Our required payment processor
We rely on Stripe to process and disburse donations. By connecting an activated Stripe account to Give Lively – a necessary step for Give Lively membership – nonprofits grant us permission to process donations, transfer funds and deliver donor data through their Stripe account.
However, much like an account with Facebook, a Stripe account is entirely independent of Give Lively. We selected Stripe because it is PCI Level 1 compliant, which means the company maintains the highest level of data security when it comes to protecting payment information. Learn more about Stripe's PCI compliance and privacy practices.
Our optional additional payment processor
PayPal is an optional donation-processing and disbursement method available to our nonprofit members, but only for one-time donations. By using it in conjunction with Give Lively, a nonprofit allows us to process donations, transfer funds and deliver donor data through its PayPal account.
Just like a bank account, however, a PayPal account is not at all connected to Give Lively. We place confidence in PayPal because of its PCI Level 1 compliance, placing it at the highest level of data security when protecting payment information. Learn more about PayPal's PCI compliance and privacy practices.
Facilitator of donations via bank (direct debit/ACH)
We use Plaid to facilitate and process debit/ACH/bank transactions. To accomplish this, Plaid receives financial information, which remains shielded from us – we don’t see any bank information – and subject to powerful information security measures. Learn more about Plaid security and its privacy practices.
Communication platform that powers Text-to-Donate
We work with Twilio, a cloud communication platform, to power our Text-to-Donate technology. Twilio allows donors to text our shortcode with a nonprofit-specific text code and, in return, receive a link to that nonprofit’s campaign. Learn more about Twilio's privacy practices.
Amazon Web Services
Cloud services platform that hosts our website and tech
Amazon Web Services (AWS) is the cloud services platform that Give Lively uses to host its website and all of its technology. Security at AWS is an extremely high priority, built to levels demanded by the most security-sensitive organizations, complete with firewalls, encryption, monitoring, penetration testing and more. Learn more about AWS security.
Cloud platform we use to build and monitor our apps
As a platform for its technology, Give Lively uses Heroku, a PCI Level 1-compliant cloud service for building, delivering, monitoring and scaling apps. Heroku’s security-conscious operations include constant threat monitoring, automatic and seamless vulnerability patching, and 24-hour support. This extends to data synchronization with Salesforce. Heroku’s physical infrastructure is hosted and managed within Amazon’s secure data centers and utilizes Amazon Web Service technology. Learn more about Heroku security.
Email service that send receipts and other notifications
Mandrill is a transactional email service, run by MailChimp, through which Give Lively sends receipts. Although no personal data is permanently filed with Mandrill, what passes through it – donation information, not including bank or card details – is stored for 30-90 days and carefully safeguarded in keeping with legal data protection requirements, as well as laws against spam. Learn more about Mailchimp's data security and privacy and its anti-spam requirements.
CRM used internally and as an external integration for nonprofits
We use Salesforce internally to record relationships with member organizations and contacts, as well as to track the status and usage of our various offerings. Our nonprofit members who use Salesforce can install our Salesforce app to automatically sync donation information. Learn more about data privacy and security at Salesforce.
Double the Donation
Taps into matching gift programs through donors’ companies
We believe all money donated to nonprofits should get to those nonprofits as quickly as possible. The speed of disbursement is in part a function of the form of payment and whether the nonprofit is a Give Lively member.
For full details about transaction fees and donation disbursement, click below.
No matter the circumstances, Give Lively’s commitment to the nonprofit community remains the same.
Our commitment to working with and for the nonprofit community is unwavering. We are fully confident of our ability to continue supporting our nonprofit members through turbulent times. Their work is never more critical than when health, welfare and economic vulnerabilities expand into new populations in the face of unexpected disruption.
To ensure our uninterrupted operations during times of crisis, we’ve taken the following steps as part of our Business Continuity plan:
As a function of circumstance, our staff is capable of delivering Give Lively services from almost anywhere.
The robustness of our technical, support and communications systems has been reviewed to accommodate this remote work. Our operations will continue to be secure and monitored as regularly as always.
Our service providers' continuity plans
Importantly, as our platform rests on the strong shoulders of several service providers, we urge our nonprofit members to proactively check our technology partners' continuity plans:
What happens when something goes wrong?
While we do everything we can to keep data secure and operations seamless, there is no such thing as 100% secure and error-free systems. Unfortunately, service interruptions and failures happen, as do unexpected and very rare instances of fundraising tech misuse.
Whatever the event, we respond to any and all concerns as quickly and thoroughly as possible. Our engineering and membership teams search for solutions, communicate how long they may take, recommend workarounds, if needed, and then advise of fixes once they have been implemented. Followup monitoring, proactive communication with all nonprofit members affected by the interruption, after-the-fact diagnostics and systemwide improvements are all part of the process.
If there is ever any reason to believe that Give Lively and its technology are not doing what they should or that the security of an account has been compromised, please contact us immediately at firstname.lastname@example.org.
What are the values that Give Lively holds dear?
We support values that inspire nonprofits to tackle tough challenges and complex issues such as gender equality, LGBTQ+ rights, social and environmental justice and more. Accordingly, we work to terminate all uses of our technology that promote activities not in alignment with our values.
Unacceptable uses include:
Discrimination on the basis of race, color, religion (creed), gender, gender expression, age, national origin (ancestry), disability, marital status, sexual orientation or military status in any activities, programs or operations
Advocating against or denying the rights of women
Advocating against or denying the rights or existence of anyone on the basis of their sex, gender, gender expression or sexual orientation, including transgender and gender nonconforming people
Advocating against or denying the rights of historically underrepresented groups, including Black, brown, AAPI and Indigenous people
Advocating against or denying environmental or social sustainability practices, especially with regard to renewable energy; land, water and air rights and use; and the growing climate emergency
Advocating for the sale, ownership and/or civilian use of assault weapons, weapons of war, high capacity magazines, automatic weapons or any mechanism that can convert a firearm into an automatic weapon
Disseminating hate speech or dangerous speech, promoting or inciting violence online or offline.