Protect Donor Data at All Costs - Roth&Co Skip to main content

November 11, 2025 BY Israel Lowinger, CPA

Protect Donor Data at All Costs

Pexels markusspiske
Back to industry updates

It started with a simple act of generosity. David clicked “Donate” on a familiar nonprofit’s website, entered his credit card details, and hit “Submit.” Moments later, his inbox filled with fraud alerts—his card had been compromised. The organization he wanted to help had inadvertently exposed him to financial risk. 

In today’s digital age, nonprofits rely heavily on online donations to fuel their missions. But this convenience comes with serious responsibilities. Every nonprofit is entrusted with sensitive personal and financial information, and the cost of neglecting that trust goes far beyond dollars—it can destroy reputations, alienate donors, and invite legal fallout. 

Is donor data security a top priority for your nonprofit? Here’s why it should be. 

The Dangers: More Than Just Numbers 

Nonprofits are especially vulnerable to cyberattacks. Unlike corporations with large IT budgets and security teams, many charities operate on a lean budget, relying on staff or volunteers with limited technical expertise. That makes them prime targets for cybercriminals. 

These organizations manage a surprising volume of valuable data—names, addresses, donation histories, and sometimes even Social Security numbers or government IDs. For online donations, credit card and bank details may briefly pass through their systems. For bad actors, this information is gold. 

The Liability: Legal, Financial, and Regulatory Risks 

A donor data breach isn’t just a tech issue—it’s a liability nightmare. 

The Gramm-Leach-Bliley Act (GLBA) 

This 1999 law allowed commercial and investment banks to merge, and created Fed-supervised holding companies. Originally designed for financial institutions, GLBA now also impacts many nonprofits—especially those managing donor-advised funds, student loans, or community aid. Even charitable missions can involve sensitive financial data, making compliance essential. 

To understand GLBA, it helps to break down its three core components:

1. The Financial Privacy Rule

This rule governs how personal financial information is collected, used, and shared. Nonprofits must clearly communicate their privacy practices to donors and clients—usually through written or online notices. These disclosures should explain what data is collected, how it’s used, and with whom it’s shared. Transparency here builds trust and fulfills the first step of compliance.

2. The Safeguards Rule

This rule requires an up-to-date, written plan to protect sensitive data. Nonprofits must: 

  • Designate one or more individuals to coordinate their information security program 
  • Identify and assess risks to customer data 
  • Design and implement safeguards, such as encryption, access controls, and regular system testing 
  • Train staff and volunteers to handle data responsibly 
  • Continuously monitor and adjust security measures as threats evolve

Even small nonprofits can meet these requirements with scalable measures, such as affordable cloud-based tools or outsourced IT management.

3. The Pretexting Rule

Pretexting refers to attempting to gain access to data under false pretenses—like impersonating a donor or vendor. This rule requires staff to be trained to recognize and prevent such social engineering attacks. Nonprofits should establish internal verification protocols and encourage staff to question suspicious requests, even if they appear legitimate. 

Vendor and Partner Compliance 

GLBA also extends to the vendors with whom a nonprofit works. If a nonprofit relies on payment processors, accountants, or CRM providers, it must ensure that they meet strong data protection standards. Contracts should define security expectations and outline response procedures in the event of a breach. 

Failure to comply risks penalties and, worse, loss of donor trust. Even if GLBA doesn’t strictly apply, following its standards signals transparency and accountability. Strong privacy policies, vendor oversight, and staff training all reinforce credibility. 

Beyond GLBA: A Web of Compliance 

Nonprofits must also navigate PCI DSS (for online donations), GDPR (for EU donors or students), and state laws such as CCPA (California) and the SHIELD Act (New York). A single breach can trigger multiple regulatory obligations, and reputational damage that can linger for years. 

 

Regulation  Applies To  Primary Focus  Key Nonprofit Obligation 
PCI DSS  Organizations processing payment card transactions  Payment card data security  Use PCI-compliant processors; never store cardholder data locally 
GDPR  Organizations processing personal data of EU individuals  Personal data privacy and consent  Obtain consent, allow deletion requests, disclose data use 
CCPA  Organizations collecting or storing data of California residents  Consumer rights and transparency  Provide data access and opt-out options 
SHIELD Act  Organizations collecting or storing data of New York residents  Data breach prevention and reporting  Maintain reasonable safeguards and notify affected parties 

 

 Noncompliance can trigger fines, lawsuits, or forced audits. Donors affected by data exposure can sue, and several nonprofits have already faced class actions. Many also discover too late that standard liability insurance doesn’t cover cyber incidents; separate cyber-liability policies are a must. 

How a Breach Erodes Trust: Damage Beyond Dollars 

Nonprofit relationships are built on trust. When donors give, they’re entrusting not just their money, but their personal information. 

A breach can undo that in days. Headlines scare off supporters, donors pull back, and partners reconsider their involvement. Rebuilding confidence can take years—if at all. Even minor incidents can cripple smaller organizations where relationships are everything. 

How to Avoid the Dangers and Stay in Compliance 

The risks are real, but protection doesn’t have to be overwhelming. Focused, consistent practices go a long way: 

  • Use PCI-compliant payment systems so credit card data never touches your servers 
  • Collect only what’s necessary and securely delete old records 
  • Limit access strictly to those who need it and review permissions regularly 
  • Adopt strong security hygiene: multi-factor authentication, strong passwords, encryption in transit and at rest 
  • Audit twice yearly to find weak spots and confirm safeguards 
  • Be transparent with donors: publish clear privacy policies and offer opt-outs or data deletion 
  • Train your team: awareness of phishing and fraud is your first defense 

When these habits are embedded into daily operations, compliance becomes second nature and donor trust follows. 

It’s More Than Managing Money 

Protecting donor data isn’t just about avoiding penalties. It’s an ethical obligation and part of your mission’s integrity. Every nonprofit owes donors a duty of care not just for their dollars, but for their data. Protecting donor data protects the mission itself. 

This material has been prepared for informational purposes only, and is not intended to provide or be relied upon for legal or tax advice. If you have any specific legal or tax questions regarding this content or related issues, please consult with your professional legal or tax advisor.