<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Technology, Digital Privacy &amp; Security - Perlman Sandbox</title>
	<atom:link href="https://dev.staging-perlmanandperlman.com/category/technology-digital-privacy-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://dev.staging-perlmanandperlman.com</link>
	<description>Perlman Sandbox</description>
	<lastBuildDate>Tue, 10 Jan 2023 20:50:53 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.7.2</generator>
	<item>
		<title>Cyber Readiness &#8211; If it Ain’t Broke, You May Still Want to Fix It…</title>
		<link>https://dev.staging-perlmanandperlman.com/cyber-readiness-if-it-aint-broke-you-may-still-want-to-fix-it/</link>
		
		<dc:creator><![CDATA[Jon Dartley]]></dc:creator>
		<pubDate>Thu, 27 Jan 2022 19:21:06 +0000</pubDate>
				<category><![CDATA[Technology, Digital Privacy & Security]]></category>
		<category><![CDATA[cyber readiness]]></category>
		<category><![CDATA[cybercriminals]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data retention]]></category>
		<guid isPermaLink="false">https://dev.staging-perlmanandperlman.com/?p=9047</guid>

					<description><![CDATA[<p>The saying “if it ain’t broke don’t fix it” is widely attributed to T. Bert (Thomas Bertram) Lance, the Director of the Office of Management and Budget in President Jimmy Carter&#8217;s 1977 administration.  Lance’s aim was to save money by adopting a fiscal policy that focused on needed repairs.  Over time, this colloquialism has come to [&#8230;]</p>
<p>The post <a href="https://dev.staging-perlmanandperlman.com/cyber-readiness-if-it-aint-broke-you-may-still-want-to-fix-it/">Cyber Readiness – If it Ain’t Broke, You May Still Want to Fix It…</a> first appeared on <a href="https://dev.staging-perlmanandperlman.com">Perlman Sandbox</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>The saying “if it ain’t broke don’t fix it” is widely attributed to T. Bert (Thomas Bertram) Lance, the Director of the Office of Management and Budget in President Jimmy Carter&#8217;s 1977 administration.  Lance’s aim was to save money by adopting a fiscal policy that focused on needed repairs.  Over time, this colloquialism has come to represent a pragmatic approach to “triaging” issues.  When it comes to cyber-security readiness, however, this approach is ill-advised.  Put another way, the fact that your organization has not experienced a security incident to date should not be rationale for maintaining the status quo.</p>
<p>Data breaches are the leading threat in today’s digital world, with a new cyberattack occurring approximately every 39 seconds. <strong>N</strong><strong>on-profit organizations are increasingly being targeted</strong> by cybercriminals, not only because of the wealth of data they possess, but because they simply do not take the same precautions nor employ the same resources as their for-profit counterparts.  In fact, small-to-medium-sized organizations are actually more likely to be targeted by hackers for that very reason.</p>
<p>The financial cost of managing a data breach is well documented.  A recent study estimated the average cost of a breech in 2021 at 4.24 million dollars, a 10% rise from 2019.  Although less tangible, the potential loss of trust of the nonprofit’s donors, volunteers and the community can be significant. Such a loss is not only difficult to restore, it can also affect fundraising activities, volunteer engagement, and partnerships with other organizations for years to come.</p>
<p>For organizations seeking to decrease their cybersecurity vulnerabilities, a good first step is to obtain a comprehensive understanding of the current risk environment. For example, what kind of data does your organization collect, store, share and transmit?  Where and how is the data being stored, and who has access to the data?  How does the organization transmit data? (Data transmission is often one of the most significant vulnerabilities; any time data is sent from one location to another, there is a risk of interception.) During the COVID-19 pandemic, the risk of insecure data transfer has increased as more and more individuals have begun accessing critical data from personal mobile devices or using personal digital storage solutions.  Assessing these weak points can be achieved through a data-privacy audit whereby information gathered is then used to strengthen the organization’s cyber-readiness.</p>
<p>Additionally, organizations should consider implementing the following measures:</p>
<p><strong><em>Implement (Or Update) Organization-Wide Cybersecurity Policies</em></strong><br />
The first step in ensuring the security of an organization’s data is to have consistent, documented cybersecurity policies in place for all employees to follow.</p>
<p><strong><em>Provide Ongoing Cybersecurity Training</em></strong><br />
Next, all individuals within the organization who have access to secure data should receive annual cybersecurity training.</p>
<p><strong><em>Focus Your Cybersecurity Efforts/Revaluate Third-Party Vendors</em></strong><br />
Focus on security controls that would be the most effective based on your specific needs and resources. And as many breaches occur from the actions/omissions of third-party vendors who store an organizations data, review the legal terms of all such agreements to make sure there are appropriate terms and conditions to protect your organization (<em>read</em> <em><a href="/are-you-protected-five-points-to-include-in-every-technology-agreement/">Are You Protected? Five Points to Include in Every Technology Agreement</a>).</em></p>
<p><strong><em>Create A Data Retention and Deletion Policy</em></strong><br />
Most organizations collect more data than they need, and hold the data longer than necessary or practical.  The more data your organization stores, the greater the liability if a breach occurs.  It is imperative that organizations adopt a policy that dictates the types of data to be stored, and when/how that data is deleted when no longer relevant.</p>
<p><strong><em>Prepare for the Unexpected</em></strong><br />
Every organization needs a plan for what to do in case of a data breach. An incident response can help organizations plan to comply with applicable laws and regulations, and launch a rapid and coordinated response that will mitigate the damaging consequences of a data breach.  On a side note, the recently enacted NY SHIELD Act requires organizations that collect information from NY residents to have both a Data Retention and Deletion policy as well as an Incident Response plan in place, among other requirements (<em>read</em> <em><a href="/shield-act-new-york-state-mind-privacy/">The SHIELD Act – A New York State of Mind … and Privacy</a>).</em></p><p>The post <a href="https://dev.staging-perlmanandperlman.com/cyber-readiness-if-it-aint-broke-you-may-still-want-to-fix-it/">Cyber Readiness – If it Ain’t Broke, You May Still Want to Fix It…</a> first appeared on <a href="https://dev.staging-perlmanandperlman.com">Perlman Sandbox</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>DAOs and the Nonprofit Sector &#8211; How Can they Work Together?</title>
		<link>https://dev.staging-perlmanandperlman.com/daos-and-the-nonprofit-sector-how-can-they-work-together/</link>
		
		<dc:creator><![CDATA[Perlman &amp; Perlman]]></dc:creator>
		<pubDate>Tue, 25 Jan 2022 18:34:06 +0000</pubDate>
				<category><![CDATA[Charitable Solicitation & Fundraising]]></category>
		<category><![CDATA[Corporate Structure]]></category>
		<category><![CDATA[Federal Oversight]]></category>
		<category><![CDATA[Fundraising Compliance]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Nonprofit]]></category>
		<category><![CDATA[Nonprofit & Tax Exempt Organizations]]></category>
		<category><![CDATA[Technology, Digital Privacy & Security]]></category>
		<category><![CDATA[Blockchain]]></category>
		<category><![CDATA[Cryptocurrency]]></category>
		<category><![CDATA[DAO]]></category>
		<category><![CDATA[decentralized autonomous organization]]></category>
		<category><![CDATA[Donation of cryptocurrency]]></category>
		<guid isPermaLink="false">https://dev.staging-perlmanandperlman.com/?p=9038</guid>

					<description><![CDATA[<p>Last November, a group of crypto investors decided to try to buy an original copy of the U.S. Constitution which was coming up for auction at Sotheby’s on November 18, 2021.1&#160;But first, they had to solve a problem – the document, one of just thirteen surviving copies of the original printing of the Constitution, was [&#8230;]</p>
<p>The post <a href="https://dev.staging-perlmanandperlman.com/daos-and-the-nonprofit-sector-how-can-they-work-together/">DAOs and the Nonprofit Sector – How Can they Work Together?</a> first appeared on <a href="https://dev.staging-perlmanandperlman.com">Perlman Sandbox</a>.</p>]]></description>
										<content:encoded><![CDATA[<p id="ftnref1">Last November, a group of crypto investors decided to try to buy an original copy of the U.S. Constitution which was coming up for auction at Sotheby’s on November 18, 2021.<a href="#ftn1"><sup style="font-size: 16px;">1</sup></a>&nbsp;But first, they had to solve a problem – the document, one of just thirteen surviving copies of the original printing of the Constitution, was expected to fetch between 15 and 25 million dollars.<a href="#ftn1"><sup style="font-size: 16px;">2</sup></a>&nbsp;The group didn’t have that kind of cash, but what they did have was knowledge of a cutting edge organizational and fundraising tool called a&nbsp;<em>decentralized autonomous organization</em>&nbsp;(DAO).<a href="#ftn1"><sup style="font-size: 16px;">3</sup></a></p>



<p>Within a week, the group created the ConstitutionDAO, organized its followers on Discord (a messaging and community platform), and raised roughly $47 million in virtual currency.<a href="#ftn1"><sup style="font-size: 16px;">4</sup></a>&nbsp;Armed with their new war chest, the group bid on, but ultimately failed to win, the Sotheby’s auction, losing out to a hedge fund billionaire who purchased the copy of the Constitution for $43.2 million (the Constitution DAO had withheld some funds to cover costs associated with winning the auction).<a href="#ftn1"><sup style="font-size: 16px;">5</sup></a></p>



<p>Following their loss, the creators of the group were faced with what to do with the virtual currency sitting in the DAO’s treasury. Many of the community members sought refunds, only to learn that the transaction costs (also known as gas fees) would eat up much of their original contribution.<a href="#ftn1"><sup style="font-size: 16px;">6</sup></a>&nbsp;Ultimately, the ConstitutionDAO’s founders decided to shut it down.<a href="#ftn1"><sup style="font-size: 16px;">7</sup></a>&nbsp;The token issued in connection with the project, originally intended to be used to allow holders to vote on what the DAO would do in the future, lives on, with some holders still hoping to profit.<a href="#ftn1"><sup style="font-size: 16px;">8</sup></a></p>



<p>What if the ConstitutionDAO had succeeded? Who would have “owned” the copy of the Constitution the group would have purchased? In a later interview one of the founders of ConstitutionDAO, Jonah Erlich, disclosed that the group had partnered with a traditional nonprofit organization that would have had legal custody of the Constitution.<a href="#ftn1"><sup style="font-size: 16px;">9</sup></a>&nbsp;The fact that this new type of organization would be reliant on a traditional nonprofit provides excellent insight into the emerging world of DAOs. It also gives us an entry point to examine this new structure.</p>



<p><strong>WHAT ARE DAOS?</strong></p>



<p>In a traditional corporation or limited liability company, the organization is formed by filing paperwork with a government office, typically a state’s Department of State. By creating a legal entity, the people behind the organization are protected from liability. When someone sues a corporation over a contract dispute or other liability, the directors, officers, employees, members, and volunteers are not liable individually. Rather, it’s the corporation that must answer for its liabilities.</p>



<p>In a DAO, however, there is no formal legal entity. Built using the same blockchain technologies that underly the virtual currency ecosystem, DAOs are organizations that are never incorporated in any state (with limited exceptions). The founders create the DAO, and it simply exists.</p>



<p id="ftnref10">While DAOs actual structures vary, most DAOs issue a token that gives members of the DAO voting rights. Once tokens are issued, in order to make decisions, all token holders are allowed to vote. The idea, touted by DAO supporters, is that this new structure democratizes organizational decision-making, placing it in the hands of the members. An oversimplified comparison would be a for-profit company that has no paid executives or board of directors, making every decision by allowing all shareholders to vote.</p>



<p>Although the ConstitutionDAO is a well-known example, DAOs are proliferating in the nonprofit community. Here are a few interesting examples: DiatomDAO is raising support to protect the oceans;<a href="#ftn1"><sup style="font-size: 16px;">10</sup></a>&nbsp;KlimaDAO hopes to speed up solutions for climate change by increasing the price of carbon assets;<a href="#ftn1"><sup style="font-size: 16px;">11</sup></a>&nbsp;Bloomeria is using NFTs to increase biodiversity;&nbsp;<a href="#ftn1"><sup style="font-size: 16px;">12</sup></a>&nbsp;and The Regen Network is issuing a token as part of a group of entities to realign the agricultural economy with ecological health.<a href="#ftn1"><sup style="font-size: 16px;">13</sup></a></p>



<p>While each of the foregoing organizations uses the language of the DAO and decentralization, they also demonstrate how the DAO community encompasses many different structures. For instance, the Regen Network is comprised of a traditional C-Corporation, a traditional 501(c)(3) public charity, and a decentralized DAO program.<a href="#ftn1"><sup style="font-size: 16px;">14</sup></a>&nbsp;The DiatomDAO is purely a decentralized entity, “owned and directed” by its token holders (see more on this below). The ConstitutionDAO, while operated as a decentralized DAO, would have relied on a traditional 501(c)(3) public charity (one named EnDAOment<a href="#ftn1"><sup style="font-size: 16px;">15</sup></a>) had it won the Sotheby’s auction and needed a legal entity with which to hold the copy of the Constitution. As you can see, while many groups use the mantle of “DAO”, the term encompasses many different structures.</p>



<p><strong>WHAT ARE THE BENEFITS OF DAOS?</strong></p>



<p id="ftnref16">Now that we’ve discussed what DAOs are, and seen some examples, let’s step back to consider what DAO proponents like about the structure. In theory, a pure DAO offers each supporter the opportunity to participate in the group’s decision-making. If a member of a charitable DAO wants to make a grant, they would propose it to the rest of the DAO community. The members then hold a vote. Using this structure, a DAO represents a more direct form of organizational decision-making and, for donors, more direct-action philanthropy.</p>



<p>Further, by avoiding any legal structure, some DAO proponents believe this new structure will give DAOs greater flexibility. Without a state’s laws dictating how decisions have to be made or how boards have to be structured, a DAO might be nimbler. Some libertarians believe that DAOs, who have no real jurisdictional nexus to any state, might even be able to avoid generally applicable laws.<a href="#ftn16"><sup style="font-size: 16px;">16</sup></a></p>



<p><strong>WHAT ARE THE DRAWBACKS OF DAOS?</strong></p>



<p>While there is a lot to be excited about by DAOs, they use an organizational structure in its infancy, with many more questions than answers. One critique is that the voting structure adopted by most DAOs (1 token = 1 vote) replicates existing problems with shareholder structures, namely, that the larger shareholders control organizational decision-making, alienating smaller shareholders. If one person holds 60% of the DAO’s tokens and the DAO implements a 50+1% vote threshold decision-making could be even more centralized than it would be in a traditional organization with a board and executives who can counterbalance a large shareholder’s interests. The DAO community has proposed some possible solutions to this problem, such as limiting votes to one per token holder, or creating non-transferable tokens to limit token holder hoarding. Each of these solutions have drawbacks, but they could drive decision-making closer to the idealized notion of the DAO.</p>



<p id="ftnref17">Another issue is the legal uncertainty of DAOs. Assume that the libertarian notion that DAOs are legally unaccountable as organizations, since they are not organized in any state nor do they have any other jurisdictional nexus with any local, state, or federal government. That might put the DAO beyond the reach of regulators and law enforcement, but it would not exempt the individuals participating in or working for the DAO, all of whom are real people subject to normal laws. Actually, the idea of a group of people running an unincorporated organization isn’t new. In New York, for instance, such an entity would be deemed an “unincorporated association.” Under longstanding common law, an unincorporated association is not legally separate from the members who comprise it.<a href="#ftn16"><sup style="font-size: 16px;">17</sup></a>&nbsp;That means that members of a DAO could be taking on direct legal risk from their participation in the DAO. If the DAO were to breach a contract, discriminate against an employee, or cause other real-world harm, the DAO’s members might be jointly and severally liable.</p>



<p>It’s also an open question whether regulators will share the libertarian view that DAOs are not subject to local, state, or federal laws. It wouldn’t be surprising to see the Securities and Exchange Commission (SEC) bring an enforcement action against a DAO, given that it has already notified the Decentralized Finance (DeFi) community that it considers many DeFI products analogous to products regulated by the Commission.<a href="#ftn16"><sup style="font-size: 16px;">18</sup></a>&nbsp;The SEC has already brought an enforcement action against a Wyoming organization operating under the guise of a DAO, albeit only after the entity sought SEC approval to register two tokens as securities.<a href="#ftn16"><sup style="font-size: 16px;">19</sup></a></p>



<p>Finally, DAOs in the philanthropic sector face the additional hurdle of providing tax-deductibility to donors. In general, a contribution to a non-charitable intermediary doesn’t allow a donor to take a tax-deduction. The answer to that question isn’t clear<a href="#ftn16"><sup style="font-size: 16px;">20</sup></a>&nbsp;as it depends on how the entity is treated for tax-purposes, whether its distributions would otherwise qualify for a tax-deductions, and whether it is considered an agent for the donors or beneficiary charities. A person hoping for a tax-deduction should contact a tax professional to examine the particular DAO’s structure and the taxpayer’s circumstances. To date, I’m unaware of any DAO specifically advertising the deductibility of contributions to its treasury, nor having considered tax-deductibility as part of their DAO structure (except, of course, for DAOs like Endaoment and Regen Network that operate using a traditional 501(c)(3) corporate structure).</p>



<p><strong>WHAT’S NEXT FOR DAOS?</strong></p>



<p id="ftn1">Despite the novelty of and the uncertainty surrounding DAOs, their popularity is undeniable. This was exemplified by the incredible enthusiasm around ConstitutionDAO. Taking advantage of the late 2021 surge in the value of many cryptocurrencies, DAOs provide an opportunity for the crypto community to put its assets to work in novel ways, including philanthropy. While they are evolving, DAOs will likely persevere, barring regulator intervention to shut them down. &nbsp;Donors and charities looking to participate in the DAO community should do so carefully, and with the benefits of advisors familiar with the DeFi and DAO space.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p style="font-size:14px"><a href="#ftnref1">1</a>&nbsp;<a href="https://www.sothebys.com/en/digital-catalogues/the-constitution-of-the-united-states" target="_blank" rel="nofollow noopener">https://www.sothebys.com/en/digital-catalogues/the-constitution-of-the-united-states</a></p>



<p style="font-size:14px"><a href="#ftnref1">2</a>&nbsp;Id.</p>



<p style="font-size:14px"><a href="#ftnref1">3</a>&nbsp;<a href="https://www.theverge.com/22820563/constitution-meme-47-million-crypto-crowdfunding-blockchain-ethereum-constitution" target="_blank" rel="nofollow noopener">https://www.theverge.com/22820563/constitution-meme-47-million-crypto-crowdfunding-blockchain-ethereum-constitution</a></p>



<p style="font-size:14px"><a href="#ftnref1">4</a>&nbsp;<a href="https://www.constitutiondao.com/" target="_blank" rel="noopener nofollow" title="">https://www.constitutiondao.com/</a></p>



<p style="font-size:14px"><a href="#ftnref1">5</a>&nbsp;<a href="https://www.vice.com/en/article/qjb8xv/hedge-fund-ceo-who-bailed-out-gamestop-short-seller-bought-the-constitution" target="_blank" rel="nofollow noopener">https://www.vice.com/en/article/qjb8xv/hedge-fund-ceo-who-bailed-out-gamestop-short-seller-bought-the-constitution</a></p>



<p style="font-size:14px"><a href="#ftnref1">6</a>&nbsp;<a href="https://www.theverge.com/2021/11/24/22800995/constitutiondao-refund-progress-steep-gas-fees-cryptocurrency" target="_blank" rel="nofollow noopener">https://www.theverge.com/2021/11/24/22800995/constitutiondao-refund-progress-steep-gas-fees-cryptocurrency</a></p>



<p style="font-size:14px"><a href="#ftnref1">7</a>&nbsp;<a href="https://www.theverge.com/2021/11/23/22799192/constitutiondao-shutting-down-lost-auction-refunds">https://www.theverge.com/2021/11/23/22799192/constitutiondao-shutting-down-lost-auction-refunds</a></p>



<p style="font-size:14px"><a href="#ftnref1">8</a>&nbsp;The latest price quote for the PEOPLE token can be found at&nbsp;&nbsp;<a href="https://coinmarketcap.com/currencies/constitutiondao/" target="_blank" rel="nofollow noopener">https://coinmarketcap.com/currencies/constitutiondao/</a>.</p>



<p style="font-size:14px"><a href="#ftnref1">9</a>&nbsp;<a href="https://www.theverge.com/22820563/constitution-meme-47-million-crypto-crowdfunding-blockchain-ethereum-constitution" target="_blank" rel="nofollow noopener">https://www.theverge.com/22820563/constitution-meme-47-million-crypto-crowdfunding-blockchain-ethereum-constitution</a>.</p>



<p style="font-size:14px"><a href="#ftnref10">10</a>&nbsp;<a href="https://diatom.fund/" target="_blank" rel="nofollow noopener">https://diatom.fund/</a></p>



<p style="font-size:14px"><a href="#ftnref10">11</a>&nbsp;<a href="https://www.klimadao.finance/" target="_blank" rel="nofollow noopener">https://www.klimadao.finance/</a></p>



<p style="font-size:14px"><a href="#ftnref10">12</a>&nbsp;<a href="https://bloomeria.org/" target="_blank" rel="nofollow noopener">https://bloomeria.org/</a></p>



<p style="font-size:14px"><a href="#ftnref10">13</a>&nbsp;<a href="https://www.regen.network/" target="_blank" rel="nofollow noopener">https://www.regen.network/</a></p>



<p id="ftn16" style="font-size:14px"><a href="#ftnref10">14</a>&nbsp;<a href="https://www.regen.network/faq/organization" target="_blank" rel="nofollow noopener">https://www.regen.network/faq/organization</a></p>



<p style="font-size:14px"><a href="#ftnref10">15</a>&nbsp;<a href="https://endaoment.org/" target="_blank" rel="nofollow noopener">https://endaoment.org/</a></p>



<p style="font-size:14px"><a href="#ftnref16">16</a>&nbsp;For instance, in his conversation on the Deep Background podcast, Erik Voorhees argued that a DAO could avoid the difficulties of employment law because no states employment laws would apply.&nbsp;<a href="https://www.pushkin.fm/episode/whats-the-deal-with-decentralized-autonomous-organizations/" target="_blank" rel="nofollow noopener">https://www.pushkin.fm/episode/whats-the-deal-with-decentralized-autonomous-organizations/</a></p>



<p style="font-size:14px"><a href="#ftnref17">17</a>&nbsp;See, generally, New York Elec. C. Assn. v. Local Union No. 3, (NY Sup. Ct. 1941), available at&nbsp;<a href="https://casetext.com/case/new-york-elec-c-assn-v-local-union-no-3" target="_blank" rel="nofollow noopener">https://casetext.com/case/new-york-elec-c-assn-v-local-union-no-3</a></p>



<p style="font-size:14px"><a href="#ftnref17">18</a>&nbsp;<a href="https://www.sec.gov/news/statement/crenshaw-defi-20211109" target="_blank" rel="nofollow noopener">https://www.sec.gov/news/statement/crenshaw-defi-20211109</a></p>



<p style="font-size:14px"><a href="#ftnref17">19</a>&nbsp;<a href="https://www.sec.gov/news/press-release/2021-231" target="_blank" rel="noopener nofollow" title="">https://www.sec.gov/news/press-release/2021-231</a>;&nbsp;<a href="https://www.coindesk.com/policy/2021/11/11/sec-stops-wyoming-based-dao-from-registering-2-digital-tokens/" target="_blank" rel="nofollow noopener">https://www.coindesk.com/policy/2021/11/11/sec-stops-wyoming-based-dao-from-registering-2-digital-tokens/</a>.</p>



<p style="font-size:14px"><a href="#ftnref17">20</a>&nbsp;For an excellent discussion, see Prof. Samuel Brunson’s blog post&nbsp;<a href="https://lawprofessors.typepad.com/nonprofit/2021/11/charitable-daos-revisited.html" target="_blank" rel="nofollow noopener">https://lawprofessors.typepad.com/nonprofit/2021/11/charitable-daos-revisited.html</a>.</p><p>The post <a href="https://dev.staging-perlmanandperlman.com/daos-and-the-nonprofit-sector-how-can-they-work-together/">DAOs and the Nonprofit Sector – How Can they Work Together?</a> first appeared on <a href="https://dev.staging-perlmanandperlman.com">Perlman Sandbox</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What Nonprofits Should Be Asking About Virtual Currency Regulation and Fundraising</title>
		<link>https://dev.staging-perlmanandperlman.com/nonprofits-asking-virtual-currency-regulation-fundraising/</link>
					<comments>https://dev.staging-perlmanandperlman.com/nonprofits-asking-virtual-currency-regulation-fundraising/#respond</comments>
		
		<dc:creator><![CDATA[Perlman &amp; Perlman]]></dc:creator>
		<pubDate>Mon, 11 Oct 2021 20:25:35 +0000</pubDate>
				<category><![CDATA[Charitable Giving]]></category>
		<category><![CDATA[Charitable Solicitation & Fundraising]]></category>
		<category><![CDATA[Fundraising Compliance]]></category>
		<category><![CDATA[IRS]]></category>
		<category><![CDATA[Nonprofit]]></category>
		<category><![CDATA[Nonprofit & Tax Exempt Organizations]]></category>
		<category><![CDATA[Technology, Digital Privacy & Security]]></category>
		<category><![CDATA[Cryptocurrency]]></category>
		<category><![CDATA[Donation of cryptocurrency]]></category>
		<category><![CDATA[virtual currency donation]]></category>
		<guid isPermaLink="false">https://dev.staging-perlmanandperlman.com/nonprofits-asking-virtual-currency-regulation-fundraising/</guid>

					<description><![CDATA[<p>Takeaway – Nonprofits can avoid risk by accepting and immediately liquidating donations of cryptocurrency. If they are planning to hold onto virtual currency for the long term, nonprofits should make sure they use platforms that are properly licensed and registered, and figure out how virtual currency can be incorporated into the nonprofit’s larger financial strategy. [&#8230;]</p>
<p>The post <a href="https://dev.staging-perlmanandperlman.com/nonprofits-asking-virtual-currency-regulation-fundraising/">What Nonprofits Should Be Asking About Virtual Currency Regulation and Fundraising</a> first appeared on <a href="https://dev.staging-perlmanandperlman.com">Perlman Sandbox</a>.</p>]]></description>
										<content:encoded><![CDATA[<p><em>Takeaway</em> – <em>Nonprofits can avoid risk by accepting and immediately liquidating donations of cryptocurrency. If they are planning to hold onto virtual currency for the long term, nonprofits should make sure they use platforms that are properly licensed and registered, and figure out how virtual currency can be incorporated into the nonprofit’s larger financial strategy. </em></p>
<p>Virtual currency is gaining mainstream attention with each passing day. Nonprofits such as <a href="https://bitpay.com/520663/donate" target="_blank" rel="noopener">the American Red Cross</a>, <a href="https://www.unicefusa.org/press/releases/unicef-launches-cryptocurrency-fund/36475" target="_blank" rel="noopener">UNICEF</a>, and <a href="https://www.cancer.org/involved/donate/more-ways-to-give/donate-cryptocurrency.html" target="_blank" rel="noopener">American Cancer Society</a> leverage platforms including <a href="https://www.thegivingblock.com/" target="_blank" rel="noopener">The Giving Block</a> and other services to accept a wide range of virtual currencies, as part of their overall fundraising strategies.</p>
<p>At our firm, we continue to work with nonprofit clients as they consider whether and how to fundraise using cryptocurrency. Here are a few questions we have been asked and other questions charities should be asking of potential fundraising platform partners.</p>
<h3>Frequently Asked Questions</h3>
<h4>Should we accept virtual currency?</h4>
<p>For many organizations, this is an easy answer – yes. There are few risks to accepting donations of virtual currency, especially if nonprofits immediately liquidate those donations.  Donors of virtual currency typically skew younger, possibly opening up a new demographic of supporters for the organization. The board should consider including virtual currency in its Gift Acceptance Policy, a document every organization should have to guide its board, executives, and staff in their development work.</p>
<h4>Should we immediately liquidate donations of virtual currency, or hold onto them?</h4>
<p>This is more difficult to answer, as it is based on how much risk the organization can tolerate. Virtual currency is <em>highly</em> volatile – its value can skyrocket or plummet within a matter of hours or days, making it a risky asset to hold onto. Whether to hold onto virtual currency is a decision that should be made with the input of a nonprofit’s board and executive team. If virtual currency is held as part of the organization’s investments, or if a donor asks the organization to hold the virtual currency as an endowment or long-term investment, the organization should consider how that fits within the organization’s overall investment strategy and portfolio, and the applicability of state laws governing the prudent management of institutional funds/assets.</p>
<p>One concern is <em>volatility</em> – few organizations want to see their donations halve in value. For many organizations, the potential upside isn’t worth the potential risk.</p>
<p>A second concern is <em>regulatory risk</em>. As the Chinese central bank, SEC, FINCEN, IRS, and other domestic and international regulators grapple with how to regulate virtual currency, the liquidity and accessibility of virtual currency markets is up in the air. Even major players like <a href="https://blog.coinbase.com/the-sec-has-told-us-it-wants-to-sue-us-over-lend-we-have-no-idea-why-a3a1b6507009" target="_blank" rel="nofollow noopener">Coinbase</a> and <a href="https://www.sec.gov/news/press-release/2020-338" target="_blank" rel="noopener">Ripple</a> have been subject to or threatened by regulatory action.</p>
<p>Charities are often cautious when holding virtual currency, concerned that the regulatory environment could shift in a way that devalues or freezes their holdings. If a nonprofit is using a virtual currency account on a platform that is subject to an SEC action, for instance, the platform might be forced to freeze transactions until such time as the SEC allows it to continue operations.</p>
<p>Organizations that are highly diversified and have the financial cushion to absorb a zeroing out of their virtual currency donations, taking into account the diversification of risk across the organization’s entire investment portfolio,  might be comfortable with the risks of virtual currency. The potential upside of assets like Bitcoin are hard to ignore – despite volatility, Bitcoin’s value has been on a consistent march upward. Other coins, like Ethereum, have not been far behind. If your organization is willing to take the risk, and has considered the prudent investment regulatory considerations, you can create a wallet at a prominent, legally-compliant platform, and park your virtual currency there and “Hold On for Dear Life” (HODL, as some in crypto-world like to say).</p>
<p>Fortunately, the major virtual currency fundraising platforms allow immediate liquidation of donations. Again, this is the option chosen by most nonprofit organizations. As I mentioned above, nonprofits should include virtual currency in their Gift Acceptance Policy and Investment Policy to help guide their development professionals as they consider whether and how to accept virtual currency donations.</p>
<h4>How do we treat virtual currency for accounting purposes?</h4>
<p>Despite continued regulatory action in other parts of the crypto market, IRS rules around donations of virtual currency have been relatively stable. <a href="https://www.irs.gov/irb/2014-16_IRB#NOT-2014-21">Since 2014</a>, the IRS has been clear that virtual currency should be treated as property. A taxpayer donating virtual currency they have held for more than a year may deduct the fair market value of the currency at the time of its donation, similar to other forms of property, such as publicly-traded stocks. This provides a tax benefit to donors who invested in virtual currency in its infancy – they can support their favorite charities without being taxed on the gains they’ve enjoyed on paper.</p>
<p>This consistent treatment from the IRS means that charities can rest assured that they can accept virtual currency in the same way that they can accept donations of appreciated stock or other forms of property. The accounting department or external accountants should be able to handle booking donations of virtual currency without much trouble. A caveat is that, in a <a href="https://www.irs.gov/individuals/international-taxpayers/frequently-asked-questions-on-virtual-currency-transactions" target="_blank" rel="nofollow noopener">nonbinding FAQ</a>, the IRS has said that nonprofits must fill out <a href="https://www.irs.gov/forms-pubs/about-form-8282" target="_blank" rel="nofollow noopener">Form 8282</a> whenever the nonprofit sells, exchanges, or otherwise disposes of its virtual currency. This is a departure from the IRS’s treatment of virtual currency as akin to stocks, which a nonprofit can sell without filing Form 8282. While not insurmountable, nonprofits and their fundraising platforms should discuss how to operationalize capturing the information required for filing Form 8282.</p>
<h3>Questions to Ask a Fundraising Platform</h3>
<p>Now that we have considered some of the frequent questions nonprofits ask their advisers, let’s consider questions nonprofits should ask a prospective fundraising platform as part of their due diligence.</p>
<h4>Are you registered as a professional fundraiser?</h4>
<p>Fundraising is regulated in most states, with each state using its own regulatory regime. Individuals and organizations that support charities are often subject to laws regulating charitable solicitation (<a href="/wp-content/uploads/2022/12/Navigating-the-Maze_Tracy-Boak-Article1.pdf" target="_blank" rel="noopener">here’s an excellent overview from my colleague Tracy Boak</a>). Charities are affected by these regulations and are obliged to make sure they only partner with organizations that are properly registered and licensed, if required.</p>
<p>Many fundraising platforms (both traditional and those dealing with virtual currency) take the position that they are not professional fundraisers, due to the way they structure their platforms and services, e.g., because they don’t affirmatively solicit donations on behalf of any charity and don’t take custody of donations. Regardless, a platform should be able to tell you why it isn’t subject to fundraising registration requirements. By asking the question, nonprofits can rest assured their fundraising platform partner is on top of its compliance obligations.</p>
<h4>Are you registered as a Money Service Business or Money Transmitter?</h4>
<p>Money Service Business (MSB) and Money Transmitter (MT) regulations are implemented at the federal and state levels. Their purpose is to weed out fraud and money laundering in the money transmission business. Generally speaking, MSB and MT laws create licensing structures that require licensed entities to do some due diligence on their customers, including “KYC” (know your customer) and “AML” (anti-money laundering) requirements.</p>
<p>Since 2013, the Financial Crimes Enforcement Network (FinCEN) has applied money transmitter regulations to some entities within the virtual currency ecosystem. According to FinCEN, if a person or organization accepts money or another instrument with monetary value from one person and transmits it to another person, that person may be classified as a money transmitter under federal regulations. (A comprehensive rundown of FinCEN’s guidance is found <a href="https://www.fincen.gov/sites/default/files/2019-05/FinCEN%20Guidance%20CVC%20FINAL%20508.pdf" target="_blank" rel="nofollow noopener">here</a>). This means that any entity that accepts virtual currency from one party and transmits it to another party could be considered a money transmitter subject to the federal rules. The same rules apply if the entity accepts virtual currency, converts it to fiat currency (i.e., U.S. dollars), and transmits the fiat currency to another person or entity.</p>
<p>FinCEN does provide some exceptions, including those entities that only provide network access or serve as payment processors, exceptions which largely do not apply to crypto-fundraising. Whether a person or entity will be treated as a money transmitter is a facts-and-circumstances determination, but FINCEN clearly intends to define money transmission broadly and interpret its exceptions narrowly (see the discussion on pages 12-22 of the guidance linked above).</p>
<p>Nonprofits considering crypto-fundraising options should ask the potential partner whether it is registered as a money transmitter. If not, ask how they ensure that their services aren’t used inappropriately – do they work with a partner that is a licensed entity? Who does their KYC and AML compliance work?</p>
<h4>Do you accept anonymous donations?</h4>
<p>Anonymous donations are nothing new – charities have received anonymous donations large and small since long before the birth of cryptocurrency. But many charities are wary of the “dark side” of cryptocurrency and its reputation (rightly or wrongly earned) for facilitating illicit activity. Nonprofits should check with their potential fundraising platform to confirm whether they allow anonymous donations. If so, ask whether the donations are anonymous to the platform, or only to the charity. If the donation is anonymous to the platform, ask whether and how the platform ensures the anonymous donations aren’t connected with illicit activity. The answer may be that the platform does not, or cannot, do anything else to ascertain the identity of donors who wish to remain anonymous. If that is the case, the nonprofit should consider whether it is comfortable with the risks of accepting anonymous donations.</p>
<p>Those risks are generally the same as accepting any other high-value anonymous donation &#8211; that a donation of virtual currency could be traced back to illicit activity or a potential clawback, if the virtual currency that is donated doesn’t belong to the donor.  One difference with anonymous donations of cash or other types of property is that the virtual currency environment is highly transparent, even if it may be highly anonymized. Bitcoin transactions are viewable on the blockchain, even if the participants in the transactions may remain anonymous.</p>
<h4>Do you issue donation receipts? Do you fill out Form 8282? Will we get a donor list?</h4>
<p>One of the core tasks in charitable fundraising is issuing receipts to donors. Donors need to keep those receipts on file, in case they want to claim a charitable deduction. Many platforms will create automatic receipts. Nonprofits should confirm that the receipts issued by its platform partners are compliant with IRS requirements, and ask for copies for your records.</p>
<p>Nonprofits should also ensure that the fundraising platform will provide you with a list of your donors, to make sure you can build out your donor base.</p><p>The post <a href="https://dev.staging-perlmanandperlman.com/nonprofits-asking-virtual-currency-regulation-fundraising/">What Nonprofits Should Be Asking About Virtual Currency Regulation and Fundraising</a> first appeared on <a href="https://dev.staging-perlmanandperlman.com">Perlman Sandbox</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://dev.staging-perlmanandperlman.com/nonprofits-asking-virtual-currency-regulation-fundraising/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>NFTs and Charities – What’s New and What Isn’t?</title>
		<link>https://dev.staging-perlmanandperlman.com/nfts-charities-whats-new-isnt/</link>
					<comments>https://dev.staging-perlmanandperlman.com/nfts-charities-whats-new-isnt/#respond</comments>
		
		<dc:creator><![CDATA[Perlman &amp; Perlman]]></dc:creator>
		<pubDate>Fri, 02 Apr 2021 12:30:52 +0000</pubDate>
				<category><![CDATA[Charitable Giving]]></category>
		<category><![CDATA[Fundraising Compliance]]></category>
		<category><![CDATA[International Philanthropy]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Nonprofit]]></category>
		<category><![CDATA[Nonprofit & Tax Exempt Organizations]]></category>
		<category><![CDATA[Technology, Digital Privacy & Security]]></category>
		<category><![CDATA[Beeple]]></category>
		<category><![CDATA[Blockchain]]></category>
		<category><![CDATA[Ether]]></category>
		<category><![CDATA[NFT]]></category>
		<category><![CDATA[Non-Fungible Tokens]]></category>
		<guid isPermaLink="false">https://dev.staging-perlmanandperlman.com/nfts-charities-whats-new-isnt/</guid>

					<description><![CDATA[<p>Takeaway – NFTs are gaining popularity. Charities are considering how they can take advantage of the NFT craze. In many ways, digital artwork and other digital assets are analogous to traditional artwork and physical assets. Nonprofits may need to conduct additional diligence on the platforms they use and organizations with which they partner. Traditional compliance [&#8230;]</p>
<p>The post <a href="https://dev.staging-perlmanandperlman.com/nfts-charities-whats-new-isnt/">NFTs and Charities – What’s New and What Isn’t?</a> first appeared on <a href="https://dev.staging-perlmanandperlman.com">Perlman Sandbox</a>.</p>]]></description>
										<content:encoded><![CDATA[<p><em>Takeaway – NFTs are gaining popularity. Charities are considering how they can take advantage of the NFT craze. In many ways, digital artwork and other digital assets are analogous to traditional artwork and physical assets. Nonprofits may need to conduct additional diligence on the platforms they use and organizations with which they partner. Traditional compliance issues, such as charitable solicitation registrations, tax compliance, and contract matters should also be considered. </em><br />
<em>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8211;</em></p>
<p>You may have heard a LOT about “NFTs”, or non-fungible tokens, recently. The buzz around NFTs reached a crescendo on March 11, when <a href="https://www.beeple-crap.com/about" target="_blank" rel="noopener">Beeple’s</a> digital artwork with a unique NFT sold in a <a href="https://onlineonly.christies.com/s/beeple-first-5000-days/lots/2020" target="_blank" rel="noopener">Christie’s digital auction</a> for <a href="https://www.christies.com/features/Monumental-collage-by-Beeple-is-first-purely-digital-artwork-NFT-to-come-to-auction-11510-7.aspx">over $69 million</a>.  Basketball fans are trading <a href="https://nbatopshot.com/" target="_blank" rel="noopener">digital highlights in NFT form</a> in an online marketplace. Charmin is even getting in on the NFT-craze, selling <a href="https://rarible.com/charmin" target="_blank" rel="noopener">unique toilet-paper inspired digital artwork</a> to raise money for <a href="https://www.directrelief.org/" target="_blank" rel="noopener">Direct Relief</a>.</p>
<p>Given the amount of money swirling around NFTs and the digital art world, nonprofits and their benefactors have started to consider how to leverage the new technology for charitable ends. With any new technology come questions and in this article I will try to cover some considerations for nonprofits that are getting into the NFT-craze.</p>
<p><em>The Basics – What Are NFTs?</em><br />
NFTs (non-fungible tokens) are a fully-digital method of proving ownership of an asset. Most assets associated with NFTs are digital assets, but NFTs could be implemented with physical assets as well. In the same way that a unique piece of art might come with a certificate of authenticity and history of ownership, NFTs use a technology that was originally developed in connection with virtual currency (called <a href="https://www.ibm.com/blockchain/what-is-blockchain" target="_blank" rel="noopener">blockchain</a>) to record and track ownership. Blockchain uses cryptography to validate transactions, making the system relatively secure. Blockchains can be private or public, depending on the use case, and NFTs are mostly stored on a <a href="https://www.cnbc.com/2021/03/23/how-to-create-buy-sell-nfts.html" target="_blank" rel="noopener">public-based blockchain associated with the cryptocurrency Ethereum</a>.</p>
<p>Almost anything digital can be ascribed an NFT. A <a href="https://www.cnn.com/2021/03/23/tech/jack-dorsey-nft-tweet-sold/index.html">tweet</a> can be given an NFT and sold. The rights to <a href="https://www.wsj.com/articles/nfts-are-music-industrys-latest-big-hit-11616491801">music</a> can be sold using an NFT.  Uses for NFTs, and the <a href="https://www.businessinsider.com/blockchain-technology-applications-use-cases" target="_blank" rel="noopener">underlying blockchain</a>, are seemingly endless – anything that involves tracking custody, ownership, or use could make use of NFTs and blockchain.  Whether or not businesses and consumers will want to buy, sell, and store an asset’s ownership records digitally on the blockchain is a different question – while cryptocurrency and blockchain supporters have been touting the technologies for over a decade, blockchain and NFTs have only gone mainstream publicly in the past few months.</p>
<p>Some people question the value of some NFT assets – who really wants to own the rights to an NBA highlight that is available on YouTube for free? Apparently a lot of people (at the time of writing, a <a href="https://nbatopshot.com/listings/p2p/a494c64e-9e93-418c-8934-f331ee47a39b+768166e3-f4bb-4395-9b48-4c545aebc95c" target="_blank" rel="noopener">Lebron James dunk is listed at $250,000</a> – it is a very good dunk). The original Mona Lisa painting is extremely valuable, whose worth isn’t decreased by additional prints being sold or versions being viewable for free online. Ownership is key to the asset’s value, whether we’re talking about a physical painting or a digital highlight.</p>
<p><em>NFTs and Charities – Similar to Auctions of Traditional Art</em><br />
When an NFT is auctioned to benefit charity, it is deeply analogous to a traditional art auction (<a href="https://www.perlmanandperlman.com/1399-2/" target="_blank" rel="noopener">a topic I discussed in another post</a>). If the artist or collector who donates a piece of digital art for sale at a charity auction wants to receive a charitable deduction, they may need to get an appraisal. The charity will need to be careful to keep records related to the donation and valuation of the asset. Prospective bidders should be told what the value of the item is, assuming a reasonable value can be determined. And winning bidders must be given a receipt which describes how much of the amount paid exceeds the fair market value of the item, if any.</p>
<p>Valuation of NFT-assets will be an extremely nuanced part of the charity auction process because the market for NFTs is so new and valuations fluctuate wildly. As an example, last year Beeple “dropped” artwork on an NFT marketplace that was resold. Between <a href="https://twitter.com/beeple/status/1361719835609169923?lang=en" target="_blank" rel="noopener">October 30 2020 and January 9, 2021</a>, a piece that sold for $1 was resold 10 times and increased in value to $7000. Any artist, donor, or charity that places a valuation on donated digital artwork or other NFT-assets should consult with experts to document the valuation appropriately and ensure that everything is properly recorded and filed.</p>
<p><em>NFTS and Charities – New Platforms and New Problems</em><br />
When Beeple’s Christie’s auction concluded, the winner paid in cryptocurrency, typical of many of the NFT marketplaces that use the Ethereum-based cryptocurrency Ether. NBA Top Shot, in contrast, will let you sign up with a credit card. As donors and charities work through the various platforms to decide with whom they want to partner to host an NFT auction, they need to consider what methods of payment are available and who their target audience will be. If the pool of potential bidders is Beeple-crazed crypto-enthusiasts, an NFT platform that requires Ether will probably work just fine. If, on the other hand, a charity wants to engage its traditional donor-base, it may want to find an auction platform that can receive traditional payments.</p>
<p>If the auction invites bids in cryptocurrency, the charity also needs to think through whether to hold that currency or convert it into fiat currency immediately upon receipt. Many charities, in the wake of the cryptocurrency boom of 2017, developed policies related to holding cryptocurrency – typically, the currencies were liquidated immediately upon receipt. Charities should consider crypto as a highly volatile asset, with potentially huge upsides and downsides. Most charities hold minimal amounts of crypto and only as part of a comprehensive, diversified investment strategy.</p>
<p>If the charity expects an auction to generate a lot of interest and a lot of funding, the charity needs to do some due diligence on the platform with whom they plan to work. With the interest in NFTs surging, so are the numbers of outlets that claim to support NFT marketplaces. If a charity wants to partner with a relatively new platform, the charity should vet the platform to make sure it is capable of performing – that it can host the auction, accept the payments, and deliver the winnings to the charity. Charities should make sure their agreement with the platform is crystal clear in terms of fees, timing, and the risk of loss if something should happen to an asset. Charities need to work with the platforms to make sure disclosures to bidders and donors are very clear on how the auction or donation will work – some states have begun to <a href="https://www.perlmanandperlman.com/california-proposes-law-regulate-online-fundraising-platforms/">consider required disclosures for fundraising platforms</a>, which can serve as a guide for charities and platforms.</p>
<p>Finally, some platforms that are operating in the NFT, blockchain, and cryptocurrency spaces may be subject to regulation as money transmitters, payment processors, or financial institutions. If a charity plans to store its assets with a platform that provides payment processing services, the charity should confirm that the platform is appropriately registered or is exempt from regulation.</p>
<p><em>Art Charities and NFTs</em><br />
Similar to the concerns outlined above about vetting platforms, if an art-based charity wishes to accept a donation of NFT artwork to retain as part of its collection, the charity needs to work through the many issues around accepting and storing NFT artwork. Review the terms and conditions of any third-party platform involved in hosting or displaying the artwork. Work with the artist or collector to confirm details around the transfer, valuation, receipt, and the costs associated with the transfer on the network. Many of the tax rules governing NFT-art donations will be identical to those applicable to donations of physical art.</p>
<p><em>International Concerns</em><br />
One of the appealing aspects of NFTs and blockchain is that transactions are borderless and frictionless. A digital marketplace based in ether cryptocurrency can receive payment without worrying about converting currency; there are no costs for shipping and the purchases can be delivered instantaneously. A charity that is considering receiving digital payments, selling digital goods, or transferring digital assets using NFTs or cryptocurrency has to be conscious of the risks associated with international transfers. The U.S. Department of the Treasury’s Office of Foreign Asset Control has published <a href="https://www.treasury.gov/resource-center/terrorist-illicit-finance/pages/protecting-index.aspx" target="_blank" rel="noopener">some guidance</a> for charities working internationally, both in the context of specific countries as well as more generally. Charities should be cognizant of the risk posed by receiving large payments from or sending payments to individuals or organizations that are overseas and may only be known as a username or Ethereum address. Charities should work with their advisors to ensure they are taking reasonable precautions to avoid the legal and reputational trouble that could arise if the charity does business with disreputable donors or recipients. Additionally, the platforms dealing in NFTs and online fundraising may also have “Know Your Customer” requirements – charities should check with the platform that they are compliant with any applicable rules.</p>
<p><em>Other Compliance</em><br />
Whether a nonprofit holds an auction online or in person, selling digital or physical art, there are traditional fundraising compliance considerations that will apply. Depending on the state in which the nonprofit is operating, the nonprofit may be required to register (my colleague Tracy Boak has a great article discussing <a href="https://www.perlmanandperlman.com/wp-content/uploads/2015/10/Navigating-the-Maze_Tracy-Boak-Article1.pdf" target="_blank" rel="noopener">charitable fundraising regulation</a>). Depending on the nature of the items sold and where buyers are located, there may be sales tax considerations. Charities should check with their advisers to confirm they have considered all legal aspects of online fundraising compliance.</p><p>The post <a href="https://dev.staging-perlmanandperlman.com/nfts-charities-whats-new-isnt/">NFTs and Charities – What’s New and What Isn’t?</a> first appeared on <a href="https://dev.staging-perlmanandperlman.com">Perlman Sandbox</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://dev.staging-perlmanandperlman.com/nfts-charities-whats-new-isnt/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>2021 &#8211; A Very Private New Year &#8211;  Steps all Nonprofits Can Take</title>
		<link>https://dev.staging-perlmanandperlman.com/2021-private-new-year-steps-nonprofits-can-take/</link>
					<comments>https://dev.staging-perlmanandperlman.com/2021-private-new-year-steps-nonprofits-can-take/#respond</comments>
		
		<dc:creator><![CDATA[Jon Dartley]]></dc:creator>
		<pubDate>Wed, 20 Jan 2021 22:21:40 +0000</pubDate>
				<category><![CDATA[Nonprofit]]></category>
		<category><![CDATA[Nonprofit & Tax Exempt Organizations]]></category>
		<category><![CDATA[Technology, Digital Privacy & Security]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[New York SHIELD Act]]></category>
		<category><![CDATA[Privacy]]></category>
		<guid isPermaLink="false">https://dev.staging-perlmanandperlman.com/2021-private-new-year-steps-nonprofits-can-take/</guid>

					<description><![CDATA[<p>It’s the time of year when we set goals for self-improvement and make our New Year’s resolutions.  One resolution I suggest that nonprofit executives include is the improvement of data privacy practices. As reported by the Identity Theft Resource Center and CyberScout, 2019 saw the total number of data breaches increase 17% over 2018. The [&#8230;]</p>
<p>The post <a href="https://dev.staging-perlmanandperlman.com/2021-private-new-year-steps-nonprofits-can-take/">2021 – A Very Private New Year –  Steps all Nonprofits Can Take</a> first appeared on <a href="https://dev.staging-perlmanandperlman.com">Perlman Sandbox</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>It’s the time of year when we set goals for self-improvement and make our New Year’s resolutions.  One resolution I suggest that nonprofit executives include is the improvement of data privacy practices. As reported by the Identity Theft Resource Center and CyberScout, 2019 saw the total number of data breaches increase 17% over 2018. The 2019 reporting year also saw a return to the pattern of the ever-increasing number of breaches and volume of records exposed.</p>
<p>As most organizations continue to have a significant portion of their workforce work remotely, 2020 will likely show a significant uptick in unauthorized access to personal information.  Additionally, the average cost for each lost or stolen record containing sensitive and confidential information increased by 4.8 percent year over year to $148. Such financial repercussions as well as the risk of incurring reputational harm that could follow unauthorized access of customer data, indicate that privacy and cyber security should be a top concern.</p>
<p>Nonprofit organizations hold a variety of personal information on behalf of their constituents and employees, and it is incumbent upon them to safeguard that information. The fact is, that with each passing year, the number of data breaches grows, and the related financial cost and reputational harm along with it. Additionally, the regulatory landscape is becoming more complex, requiring organizations to comply with an increasing number of requirements or face penalties.</p>
<p>Due to the continued need to protect information, New York State enacted Stop Hacks and Improve Electronic Data Security Act (“SHIELD Act”) on March 21 of 2020.   This new law applies to any organization that receives or collects private information about New York residents through the Internet, and requires, among things that your organization.   The Act requires specific actions and imposes a variety of obligations, and significant fines may be levied for non-compliance.  Among other requirements, to meet the SHIELD Act requirements organizations must:</p>
<ol>
<li>conduct a risk assessment of its cybersecurity program;</li>
<li>properly vet all third-party service providers to ensure they can comply with the NY SHIELD Act, and include in its contracts specific provisions related to cybersecurity practices;</li>
<li>have policies and procedures related to the deletion and/ or disposal of data within a reasonable amount of time after it is no longer needed for business purposes;</li>
<li>develop and implement a written incident/data breach response plan so that you can comply swiftly and completely with the Acts reporting requirements (or face potentially harsh penalties); and</li>
<li>designate a “point person” to coordinate your data-security program to meet compliance.</li>
</ol>
<p>The good news is that conducting a privacy audit can significantly reduce potential “data incidents” and minimize the related risks.  It is also a big step to achieving SHIELD compliance.   A privacy audit is essentially a process to identify, across the organization (and chapters), the types of personal information collected, the ways in which it is protected, and with whom such information is shared.</p>
<p>The following risk assessment methodology is a good place to start.<br />
• <strong>Inventory </strong>Locate the places in the organization (and vendors operating on its behalf) that house/store Personally Identifying Information (“PII”), identifying both electronic files/databases and physical files<br />
• <strong>Safeguards</strong> Assess the safeguards in place – including the physical, administrative and technical controls – and whether they are adequate and reasonable considering the type of PII being stored (SSN vs. email address for example might have different levels of protection).<br />
• <strong>Gaps</strong> Determine the compliance gap – essentially the difference between that what it should be doing, and the organizations actual practices.<br />
• <strong>Risk Assessment </strong>For most organizations there will be a number of gaps. As a first step, for the PII held in various locations and with various vendors, assess the risk of non-compliance, determine the impact of non-compliance and likelihood of risk occurrence, and use this to help prioritize compliance efforts.<br />
• <strong>Remediation</strong> Depending upon the finding/conclusions in the previous steps, remediation should be a joint effort among various members of the organization to address and remedy any identified shortfalls/gaps.</p>
<p>As organizations look to identify material risks and implement processes and procedures to protect their data and hence their missions &#8211; data privacy and cyber security will no doubt continue to be a critical concern.  Now is the right time to conduct a privacy audit.</p>
<p>&nbsp;</p><p>The post <a href="https://dev.staging-perlmanandperlman.com/2021-private-new-year-steps-nonprofits-can-take/">2021 – A Very Private New Year –  Steps all Nonprofits Can Take</a> first appeared on <a href="https://dev.staging-perlmanandperlman.com">Perlman Sandbox</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://dev.staging-perlmanandperlman.com/2021-private-new-year-steps-nonprofits-can-take/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Influencer Philanthropy and Social Media – What are the Rules, What are Best Practices?</title>
		<link>https://dev.staging-perlmanandperlman.com/influencer-philanthropy-social-media-rules-best-practices/</link>
					<comments>https://dev.staging-perlmanandperlman.com/influencer-philanthropy-social-media-rules-best-practices/#respond</comments>
		
		<dc:creator><![CDATA[Perlman &amp; Perlman]]></dc:creator>
		<pubDate>Tue, 01 Dec 2020 22:06:01 +0000</pubDate>
				<category><![CDATA[Charitable Giving]]></category>
		<category><![CDATA[Fundraising Compliance]]></category>
		<category><![CDATA[Nonprofit]]></category>
		<category><![CDATA[Nonprofit & Tax Exempt Organizations]]></category>
		<category><![CDATA[State Registration & Compliance]]></category>
		<category><![CDATA[Technology, Digital Privacy & Security]]></category>
		<category><![CDATA[charitable solicitation disclosures]]></category>
		<category><![CDATA[fundraiser]]></category>
		<category><![CDATA[influencer]]></category>
		<category><![CDATA[influencer philanthropy]]></category>
		<category><![CDATA[social media influencer]]></category>
		<guid isPermaLink="false">https://dev.staging-perlmanandperlman.com/influencer-philanthropy-social-media-rules-best-practices/</guid>

					<description><![CDATA[<p>*NOTE – links included herein are for informational purposes only. Neither the author nor the firm are in any way affiliated with any of the individuals or in any way endorse the influencers, their campaigns, or their beneficiaries* In the run up to this year’s presidential election, author Shea Serrano published A Difficult Conversation, a [&#8230;]</p>
<p>The post <a href="https://dev.staging-perlmanandperlman.com/influencer-philanthropy-social-media-rules-best-practices/">Influencer Philanthropy and Social Media – What are the Rules, What are Best Practices?</a> first appeared on <a href="https://dev.staging-perlmanandperlman.com">Perlman Sandbox</a>.</p>]]></description>
										<content:encoded><![CDATA[<p><em>*NOTE – links included herein are for informational purposes only. Neither the author nor the firm are in any way affiliated with any of the individuals or in any way endorse the influencers, their campaigns, or their beneficiaries*</em></p>
<p>In the run up to this year’s presidential election, author Shea Serrano published <a href="https://gumroad.com/sheaserrano#akjbPu" target="_blank" rel="noopener">A Difficult Conversation</a>, a guide to addressing the growing gap between the people who support Donald Trump and the people who do not. Priced at $0, it is a pay-what-you-want piece of art that, if you are familiar with Mr. Serrano’s <a href="https://twitter.com/sheaserrano" target="_blank" rel="noopener">Twitter feed</a>, surprised no one. What is surprising is how much people voluntarily paid for the free e-book – at least $98,160.84 to date. In response, Mr. Serrano and his wife decided to donate all of the proceeds to the causes <a href="https://twitter.com/SheaSerrano/status/1323668552801525761?ref_src=twsrc%5Etfw%7Ctwcamp%5Etweetembed%7Ctwterm%5E1323668552801525761%7Ctwgr%5E&amp;ref_url=https%3A%2F%2Fwww.newsweek.com%2Fauthor-donates-proceeds-trump-book-1544547" target="_blank" rel="noopener">they believe in</a>.</p>
<p>Mr. Serrano’s unexpected philanthropy fits a new pattern, for him and other social media celebrities. Celebrity philanthropy is not limited to the large televised “Live Aid” style fundraisers to raise awareness and funds for important causes.  While that model still exists, social media has created new avenues for small scale, targeted relief amplified by passionate digital followers.  In the early days of the COVID-19 pandemic, <a href="https://www.nytimes.com/2020/03/16/business/coronavirus-bills-charity.html" target="_blank" rel="noopener"> influencers made cash payments</a> to those impacted by shuttered businesses and missed paychecks. This new trend is getting increasing attention, including from at least one <a href="https://twitter.com/BarackObama/status/1240660587677450244?ref_src=twsrc%5Etfw">former President</a>.</p>
<p>While charities continue to directly raise funds from their current donors, they are finding new supporters through partnerships with these “<a href="https://www.wired.com/story/what-is-an-influencer/" target="_blank" rel="noopener">influencers</a>” , i.e. the individuals who have a large active following of enthusiastic fans on social media.  Influencers have been working with charities for some time, and we’ve long known that <a href="https://www.olapic.com/resources/consumers-follow-listen-trust-influencers_article/" target="_blank" rel="noopener">consumers respond</a> to them, in much the same way that celebrities shape consumer opinion in the for-profit world. What’s new is the way in which some influencers establish a relationship with their followers and charities; instead of entering into partnerships up front, social media and e-commerce allows influencers to raise large amounts of cash and distribute it to charities and directly to individuals without any extra infrastructure.</p>
<p>With innovations come new questions. In the case of <em>influencer philanthropy</em>, those questions tend to center on compliance. Influencers, and the charities they support, must take into account the social media platforms rules as well as local, state, and federal laws. In this article, I highlight some of the possible issues and considerations. I examine a few different fundraising strategies I’ve noticed. In each case, the considerations for charities may differ from those of influencers.  Some methods are straightforward, requiring little if any compliance considerations for influencers and charities. Methods involving partnerships with for-profit companies or cash giveaways by influencers can have tax and other compliance consequences.</p>
<p><strong>Summary of Influencer Fundraising Models</strong></p>
<p>There are a few ways that influencers try to do good. As described above, sometimes they publicize gifts after-the-fact, creating a halo effect for the influencer as well as spotlighting the charities or causes benefiting from the influencer’s gifts. For these after-the-fact gifts, there’s no pre-existing agreement between an influencer and the charity.  In fact, the charities or the individuals receiving gifts might not know that a gift is coming until they receive a check (or Venmo or CashApp or PayPal).</p>
<p>Another model that has emerged recently is the direct cash disbursement which is advertised in advance to the influencer’s followers. While these types of disbursements aren’t new, they became <a href="https://www.nytimes.com/2020/04/27/style/instagram-cash-giveaways-coronavirus.html" target="_blank" rel="noopener">prominent</a> in the early stage of the pandemic. Influencers told their followers that they had cash to give away– all followers had to do for a chance to receive some cash was comment on the influencer’s post and follow other Instagram accounts that had paid for the privilege of being part of the promotion. The influencer would, in turn, receive a payment from a social media marketing firm that set up the campaign.</p>
<p>A third method involves influencers asking their followers to send cash which the influencer will then distribute. The recipients of the cash vary – sometimes the funds are given to organizations, in other cases the money is <a href="https://abc30.com/restaurant-food-blogger-instagram/6405222/" target="_blank" rel="noopener">given to individuals</a> that the influencer deems worthy of support. At times the influencer will be specific about the organization or person that is the intended recipient, but many times the beneficiary is open-ended.</p>
<p>A fourth method involves for-profit charitable partnerships. For example, a dog-themed Instagram account raises awareness for a local shelter by telling their followers about a charitable sales promotion where the purchase of a particular dog food triggers a donation to the shelter. The influencer may be compensated by the for-profit, the nonprofit, or may receive no compensation at all, depending on the arrangement. Alternatively, an influencer might try to sell one of their own products (a book, for instance) and include a promise to donate some proceeds to charity.</p>
<p>Finally, some influencers simply attempt to drive traffic to individual fundraising campaigns that are already underway. One of Twitter’s most popular canine evaluation accounts, <a href="https://twitter.com/dog_rates" target="_blank" rel="noopener">@dog_rates</a>, highlights one or two fundraisers <a href="https://twitter.com/dog_rates/status/1327302822338195456" target="_blank" rel="noopener">every Friday</a> to support a dog and its humans. The influencer selects one campaign to highlight, driving small dollar donations from the account’s 8.8 million followers.</p>
<p><strong>Compliance Issues</strong></p>
<p>For each of the models described above, there are a few overarching compliance issues that influencers and charities need to consider. There may be tax consequences from their fundraising, for influencers, charities, or their donors. They must also review the terms and conditions for the sites on which they’re fundraising.</p>
<p><u>Platforms</u></p>
<p>The platforms’ rules are the first thing to review before launching a new fundraiser. <a href="https://www.facebook.com/fundraisers/about/personal-fundraising" target="_blank" rel="noopener">Facebook</a>, <a href="https://help.twitter.com/en/rules-and-policies/twitter-contest-rules" target="_blank" rel="noopener">Twitter</a>, and <a href="https://help.instagram.com/179379842258600" target="_blank" rel="noopener">Instagram</a> each publish specific rules governing promotions and fundraisers. In each case, some of each platform’s general guidelines will also apply to influencer fundraisers, such as the rules encouraging authenticity and discouraging fraud.</p>
<p><u>Federal Trade Commission</u></p>
<p>In addition to the platforms, the Federal Trade Commission (FTC) has published <a href="https://www.ftc.gov/system/files/documents/plain-language/1001a-influencer-guide-508_1.pdf" target="_blank" rel="noopener">guidelines</a> on the appropriate disclosures for influencer behavior. While targeted primarily at influencers working with for-profit brands, the disclosure guidelines are helpful for all influencers interacting with US users. These recommendations include:</p>
<ul>
<li>Tell users if you will receive any kind of financial, employment, personal, or other benefit in connection with a post</li>
<li>Ensure that disclosures are prominent</li>
<li>Use clear, simple language</li>
<li>Be honest</li>
</ul>
<p>These types of disclosures are especially important if an influencer’s post involves any possible compensation for the influencer. For instance, if the influencer is selling an item and promises that a portion of the proceeds will go to charity, they should be clear how much will be donated (a percentage or flat amount per sale), how long the promotion runs, which charity will receive the donation(s), and if there’s a minimum guaranteed donation. If the influencer is being paid to help drive dollars or attention to a charity or fundraiser, they should include a disclosure to that effect so their followers understand their motivation.</p>
<p><u>Taxes</u></p>
<p>Influencers, charities, and individuals each need to consider the tax consequences of online fundraisers. Whenever influencers collect donations from their followers, they may need to report those donations as income. There are exceptions where the influencer is acting as the agent for the recipient, but the default rule is generally that income is taxable. If the influencer makes a donation directly to an individual rather than to a charity, the individual should be able to treat the income as a gift (and therefore not taxable) but should check with a professional to confirm. There may be ways to structure a campaign to ensure the recipient doesn’t have a big tax bill if the fundraiser is especially successful.</p>
<p>Next, some donors want to know if their donation is tax-deductible. Although small donors aren’t typically taking their tax bill into consideration when they decide to send $10 to an influencer, the influencer collecting donations should clarify whether donors will be eligible for a tax deduction. There are multiple ways to structure campaigns that may permit donations to be tax-deductible.</p>
<p><u>State Registrations</u></p>
<p>If an influencer is receiving any kind of compensation in exchange for raising money for a charity, they may have to register to solicit with one or more states. They could be considered either a professional fundraiser or a commercial co-venturer, depending on the arrangement. Each state treats paid fundraisers differently, so the influencer must be careful to check with counsel who understand what filing requirements apply.</p>
<p><u>Best Practices</u></p>
<p>Regardless of what rules apply, best practices for any kind of fundraiser are diligence and transparency. Influencers can be diligent by planning out their posts and fundraisers. The first step is to research the charity that the influencer seeks to support. As multiple organizations may have confusingly similar names, checking will help to avoid directing someone to the wrong organization! Unless the influencer has first-hand knowledge of the charity, they should also review the charity’s most recent financial filings to make sure it is healthy and can legally use the funds the influencer plans to raise.</p>
<p>The influencer should get in touch If they have identified a charity they want to support. The charity may agree to collaborate to increase the influencer’s reach or, at the least, capitalize on the attention the influencer will bring. The charity may also want to set some guidelines, either through a formal agreement or just through discussions, to make sure the influencer doesn’t do or say anything that would harm the charity’s reputation or tax status.</p>
<p>Finally, the influencer should value transparency by explaining exactly what they plan to do with the money they raise, including the timing for distribution, the intended recipients, and what is yet unknown.  It’s possible that the influencer won’t know in advance who will receive the cash they raise, but that’s not necessarily a problem. If the influencer sets some criteria, that at least should be shared with their followers.</p><p>The post <a href="https://dev.staging-perlmanandperlman.com/influencer-philanthropy-social-media-rules-best-practices/">Influencer Philanthropy and Social Media – What are the Rules, What are Best Practices?</a> first appeared on <a href="https://dev.staging-perlmanandperlman.com">Perlman Sandbox</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://dev.staging-perlmanandperlman.com/influencer-philanthropy-social-media-rules-best-practices/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>We Won’t Get Fooled Again &#8211; Blackbaud Data Breach</title>
		<link>https://dev.staging-perlmanandperlman.com/wont-get-fooled-blackbaud-data-breach/</link>
					<comments>https://dev.staging-perlmanandperlman.com/wont-get-fooled-blackbaud-data-breach/#respond</comments>
		
		<dc:creator><![CDATA[Jon Dartley]]></dc:creator>
		<pubDate>Tue, 25 Aug 2020 18:04:24 +0000</pubDate>
				<category><![CDATA[Contracts & Commercial Transactions]]></category>
		<category><![CDATA[Technology, Digital Privacy & Security]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[vendor contract]]></category>
		<guid isPermaLink="false">https://dev.staging-perlmanandperlman.com/wont-get-fooled-blackbaud-data-breach/</guid>

					<description><![CDATA[<p>Today, more and more nonprofits rely on third-party vendors for technology solutions to provide a range of services and operational support, including donor outreach and management, web platforms, payment processing solutions, and data storage.  This past May, Blackbaud, a prominent service technology provider to nonprofits, announced that it suffered a major data breach.  Whether or [&#8230;]</p>
<p>The post <a href="https://dev.staging-perlmanandperlman.com/wont-get-fooled-blackbaud-data-breach/">We Won’t Get Fooled Again – Blackbaud Data Breach</a> first appeared on <a href="https://dev.staging-perlmanandperlman.com">Perlman Sandbox</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>Today, more and more nonprofits rely on third-party vendors for technology solutions to provide a range of services and operational support, including donor outreach and management, web platforms, payment processing solutions, and data storage.  This past May, Blackbaud, a prominent service technology provider to nonprofits, announced that it suffered a major data breach.  Whether or not your organization was affected, the recent Blackbaud breach &#8211; and their very-delayed and by many accounts lackluster response &#8211; is a wake-up call for organizations to consider the terms of their relationship with all third-party vendors.</p>
<p>The reality is that most of the “default” third-party terms are invariably one-sided in favor of the vendor. Should things go awry as they did with the Blackbaud incident, it is vital to have the appropriate legal terms in the contract to protect your interests.  While it is impossible to provide an exhaustive list of issues to be considered in negotiating a contract, I recommend that the following five points should always be addressed prior to signing a third-party technology contract.</p>
<p><strong>1. Adjust the Limitation of Liability Cap</strong></p>
<p>Vendors routinely attempt to limit any claims for loss or damage that might be incurred.  Typically, they try to limit the recovery period to six months, or even less, of fees paid.  I suggest that the “cap” be set at some multiple of the contract value, and not be tied to monies paid to date. This avoids having limited recompense for claims that occur early on in the contract term.</p>
<p><strong>2. Draft Exclusions to the Limitation of Liability Cap</strong></p>
<p>Related to the first provision, most types of damage are “capped” at some pre-agreed dollar amount.  However, certain damage, because it poses a greater risk to your organization and its reputation, should be excluded.  As an example, damage that results from a data breach, indemnified claims and breaches of your confidential information should never be capped. In the case of the Blackbaud breach, such an exclusion would have allowed your organization to fully recover all losses and expenses.</p>
<p><strong>3. Require Breach Notification and Credit Monitoring Expenses</strong></p>
<p>The Blackbaud incident illustrates that breaches happen.  Although unfortunate, the reality is that no system or platform is “breach proof.”  Even if your vendors maintain all the various physical, logical and administrative security precautions that have been reasonably requested, breaches can occur.</p>
<p>If a breach occurs and notification is required, your vendor is obligated to notify you alone, not your end-user donors.  For this reason, I strongly recommend that you require <em>any </em>vendor that has access to personally identifiable information on your behalf, to agree to pay for all fines, expenses and costs related to the breach, including notification to your donors, regulatory fines, and credit monitoring services for the potentially affected individuals.  They should also be required to promptly notify you of any breach or suspected breach – my recommendation is within 48-72 hours.  Blackbaud took over two months to provide notification!  This is reprehensible &#8211; but they are now the exception that proves the rule: contractually obligate your vendors to timely notice.</p>
<p><strong>4. Insist on Specific Cyber/Privacy Representations and Warranties</strong></p>
<p>During the sales pitch, prospective clients are presented with polished and detailed marketing materials that exhaustively detail the various aspects of the vendor’s product, including the various cyber-security precautions they have in place.  However, most contracts provide scant details of the actual precautions to be undertaken.  Bottomline, if a vendor is getting access to any personally identifiable information, you should have specific and detailed cyber-security and privacy requirements spelled out in the contract.</p>
<p><strong>5. Request Transition Services</strong></p>
<p>Vendor relationships do not last forever.   When the time comes to change a vendor, the transition can be a lengthy and arduous process.  When the existing vendor is reluctant to assist with the facilitation of the transition, the client gets stuck with the logjam.  To mitigate this issue, I always insist on including a provision in the contract that requires the vendor to provide ongoing services and specific transition support at their current standard rates for a specified period of time.</p>
<p>In the sentiments of Robert Frost, good contracts make good vendors.  As the Blackbaud data breach illustrates, “stuff” happens.  While this is one of many third-party providers to suffer a data breach, the attack on Blackbaud serves as a stark example of why organizations need to take the time to carefully evaluate third-party vendor privacy and cyber security practices, as well as insist on specific contractual terms that define accountability and responsibilities in the event of an incident.  (And FYI, the NY SHIELD Act requires all organizations that collect information on NY residents to review all such contracts with third-party vendors to endure that such contracts impose specific technological, administrative and physical safeguards). Failure to do so could leave your organization with limited recourse and remedies when the worst happens.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p><p>The post <a href="https://dev.staging-perlmanandperlman.com/wont-get-fooled-blackbaud-data-breach/">We Won’t Get Fooled Again – Blackbaud Data Breach</a> first appeared on <a href="https://dev.staging-perlmanandperlman.com">Perlman Sandbox</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://dev.staging-perlmanandperlman.com/wont-get-fooled-blackbaud-data-breach/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Is it Time for a Cyber Risk Check-up?</title>
		<link>https://dev.staging-perlmanandperlman.com/time-cyber-risk-check/</link>
					<comments>https://dev.staging-perlmanandperlman.com/time-cyber-risk-check/#respond</comments>
		
		<dc:creator><![CDATA[Jon Dartley]]></dc:creator>
		<pubDate>Mon, 08 Jun 2020 14:11:35 +0000</pubDate>
				<category><![CDATA[State Regulations]]></category>
		<category><![CDATA[Technology, Digital Privacy & Security]]></category>
		<category><![CDATA[#COVID-19]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[NY SHIELD Act]]></category>
		<category><![CDATA[provacy laws]]></category>
		<category><![CDATA[VPN]]></category>
		<guid isPermaLink="false">https://dev.staging-perlmanandperlman.com/time-cyber-risk-check/</guid>

					<description><![CDATA[<p>COVID-19 has been dominating the news, and with good reason.  While the situation is certainly “fluid,” it is likely that many organizations will continue to ask their employees to work remotely — at least periodically — for some time.   It is important to remember that doing so is not without risks.  As most organizations [&#8230;]</p>
<p>The post <a href="https://dev.staging-perlmanandperlman.com/time-cyber-risk-check/">Is it Time for a Cyber Risk Check-up?</a> first appeared on <a href="https://dev.staging-perlmanandperlman.com">Perlman Sandbox</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>COVID-19 has been dominating the news, and with good reason.  While the situation is certainly “fluid,” it is likely that many organizations will continue to ask their employees to work remotely — at least periodically — for some time.   It is important to remember that doing so is not without risks.  As most organizations have information to protect, now is the time to consider the potential “cyber” risks of remote working, and remedial actions that can be taken to mitigate these risks.  The fact is that home office environments are not as secure as work environments.   Unfortunately, hackers are well aware of these vulnerabilities, and “phishing” and other schemes aimed to compromise personally identifiable information has been on the rise over the past couple months.</p>
<p><strong>This is a good time to audit the protocols your organization recently implemented and ensure that your colleagues recognize and alleviate risks when they are routinely working from home.</strong>  Below are some typical risks, with strategies to minimize those risks.</p>
<ul>
<li><strong>Unsecured WIFI networks: </strong>Home networks (and use of public networks) may be vulnerable to malware or ransomware attacks through their wireless router – <em>Secure home WIFI networks with a robust password and, when possible, avoid use of public networks. </em></li>
<li><strong>Working on unsecured personal devices: </strong>Home computers may lack critical security patch management – <em>Employees should only conduct work on their employer-issued computers. Where this is not possible personal laptops should not be allowed to leave the home. </em></li>
<li><strong>Transferring corporate data using personal email accounts:</strong> Employees may send sensitive information to their personal email accounts; non-enterprise email accounts usually lack the protections that commercial accounts often have – <em>Advise employees against sending sensitive company data to their personal email accounts, and to permanently delete any corporate data remaining on their email accounts after they return to their normal working arrangement. </em></li>
<li><strong>“Hard-Copy” document management and destruction</strong>: Employees may take hard-copy sensitive or confidential materials off-site that they would not otherwise – <em>Advise as to proper destruction and to avoid disposing of documents at home or in a public place without proper cross-cut shredding. </em></li>
<li><strong>Unsecured connections to organizational systems:</strong> Absent a secure virtual private network (VPN), employees may attempt to connect to your systems in an insecure manner – <em>Investigate the viability of configuring a VPN for employees accessing your systems.</em></li>
<li><strong>Syncing with personal cloud storage accounts</strong>: Employees working remotely may use a personal cloud service account to transfer documents or data to and from office that may be less secure – <em>Monitor use and consider creating a list of recommended providers.</em></li>
<li><strong>Key vendor relationships</strong>: Most organizations rely on third-party vendors to support both internal and external mission-critical services.  These services could be impacted should these companies also ask their employees to work from home – <em>Proactively reach out to these vendors to inquire as to their plans to continue to support your organization and to keep your data safe (as summarized above); also review the contracts in place to be aware of your rights and remedies.</em></li>
</ul>
<p><strong>It is important to remember that although COVID-19 has posed challenges in regard to good cyber practices, privacy laws, regulations and expectations still apply. </strong></p>
<p>For example, the New York State’s Stop Hacks and Improve Electronic Data Security Act (“SHIELD Act”), went into effect on March 21 of this year.   This new law applies to any for profit or nonprofit organization that receives or collects private information about New York residents.  Simply put, if your organization has a website, it’s likely you need to comply with the provisions of the SHIELD Act (and there are substantial fines for noncompliance).  Among the many obligations, the SHIELD Act expects organizations to 1) implement reasonable [administrative, physical and technical] safeguards to protect the security, confidentiality and integrity” of data, and 2) properly vet all third-party service providers and include specific provisions related to cyber-security practices, and 3) designate a “point person” to coordinate your data security program.   <strong><u>Many organizations would have fallen short of these requirements prior to COVID-19 — many more will fall short today as employees continue their work from home</u>.</strong>  While meeting these requirements may seem daunting, they are more easily achieved than one might initially think.  I routinely help organizations to achieve compliance with the SHIELD Act and other similar regulations and best practices, and in doing so these organizations become better “stewards” of the personal information they collect on behalf of their employees and donors.</p>
<p><em>Jon Dartley is an attorney with in-depth knowledge of the laws of data privacy regulation. You may reach him at jon@perlmanandperlman.com. </em></p><p>The post <a href="https://dev.staging-perlmanandperlman.com/time-cyber-risk-check/">Is it Time for a Cyber Risk Check-up?</a> first appeared on <a href="https://dev.staging-perlmanandperlman.com">Perlman Sandbox</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://dev.staging-perlmanandperlman.com/time-cyber-risk-check/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>COVID-19 and Cyber-Readiness &#8211; Good Practices for Remote Work</title>
		<link>https://dev.staging-perlmanandperlman.com/covid-19-cyber-readiness-good-practices-remote-work/</link>
					<comments>https://dev.staging-perlmanandperlman.com/covid-19-cyber-readiness-good-practices-remote-work/#respond</comments>
		
		<dc:creator><![CDATA[Jon Dartley]]></dc:creator>
		<pubDate>Wed, 11 Mar 2020 19:46:21 +0000</pubDate>
				<category><![CDATA[Employment]]></category>
		<category><![CDATA[Technology, Digital Privacy & Security]]></category>
		<guid isPermaLink="false">https://dev.staging-perlmanandperlman.com/covid-19-cyber-readiness-good-practices-remote-work/</guid>

					<description><![CDATA[<p>COVID-19 has been dominating the news, and with good reason.  While the situation is certainly “fluid”, it is likely that many organizations will at some point be asking their employees to work remotely;  it is important to remember that doing so it not without its risks.  As most organizations have information to protect, now is [&#8230;]</p>
<p>The post <a href="https://dev.staging-perlmanandperlman.com/covid-19-cyber-readiness-good-practices-remote-work/">COVID-19 and Cyber-Readiness – Good Practices for Remote Work</a> first appeared on <a href="https://dev.staging-perlmanandperlman.com">Perlman Sandbox</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>COVID-19 has been dominating the news, and with good reason.  While the situation is certainly “fluid”, it is likely that many organizations will at some point be asking their employees to work remotely;  it is important to remember that doing so it not without its risks.  As most organizations have information to protect, now is the time to consider the potential “cyber” risks of remote working, and remedial actions that can be taken to mitigate these risks.</p>
<ul>
<li><strong>Unsecure WIFI networks: </strong>Home networks (and use of public networks) may be vulnerable to malware or ransomware attacks through their wireless router &#8211; <em>Secure home WIFI networks with a robust password and, when possible, avoid use of public networks. </em></li>
<li><strong>Working on unsecure personal devices: </strong>Home computers may lack critical security patch management &#8211; <em>Employees should only conduct work on their employer-issued computers. Where this is not possible personal laptops should not be allowed to leave the home. </em></li>
<li><strong>Transferring corporate data using personal e-mail accounts</strong>: Employees may send sensitive information to their personal email accounts; non-enterprise email accounts usually lack the protections that commercial accounts often have &#8211; <em>Advise employees against sending sensitive company data to their personal email accounts, and to permanently delete any corporate data remaining on their email accounts after they return to their normal working arrangement. </em></li>
<li><strong>“Hard-Copy” document management and destruction</strong>: Employees may take hard-copy sensitive or confidential materials off-site that they would not otherwise &#8211; <em>Advise as to proper destruction and to avoid disposing of documents at home or in a public place without proper cross-cut shredding. </em></li>
<li><strong>Unsecure connections to organizational systems:</strong> Absent a secure virtual private network (VPN),employees may attempt to connect to your systems in an insecure manner &#8211; <em>investigate the viability of configuring a VPN for employees accessing your systems.</em></li>
<li><strong><em>Synching with personal cloud storage accounts</em></strong><em>: Employees working remotely may use a personal cloud service account to transfer documents or data to and from office that may be less secure &#8211; Monitor, recommend/advise. </em></li>
<li><strong>Key vendor relationships:</strong> Most organizations rely on third-party vendors to support both internal and external mission-critical services.  These services could be impacted should these companies also ask their employees to work from home &#8211; <em>Proactively reach out to these vendors to inquire as to their plans to continue to support your organization and to keep your data safe (as summarized above); also review the contracts in place to be aware of your rights and remedies.</em></li>
</ul><p>The post <a href="https://dev.staging-perlmanandperlman.com/covid-19-cyber-readiness-good-practices-remote-work/">COVID-19 and Cyber-Readiness – Good Practices for Remote Work</a> first appeared on <a href="https://dev.staging-perlmanandperlman.com">Perlman Sandbox</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://dev.staging-perlmanandperlman.com/covid-19-cyber-readiness-good-practices-remote-work/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>California Consumer Privacy Act (CCPA)  &#8211; You are not California Dreamin&#8217;!</title>
		<link>https://dev.staging-perlmanandperlman.com/california-consumer-privacy-act-ccpa-you-are-not-california-dreamin/</link>
					<comments>https://dev.staging-perlmanandperlman.com/california-consumer-privacy-act-ccpa-you-are-not-california-dreamin/#respond</comments>
		
		<dc:creator><![CDATA[Jon Dartley]]></dc:creator>
		<pubDate>Mon, 16 Dec 2019 21:38:04 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[State Regulations]]></category>
		<category><![CDATA[Technology, Digital Privacy & Security]]></category>
		<category><![CDATA[california]]></category>
		<category><![CDATA[CCPA]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[Privacy Act]]></category>
		<guid isPermaLink="false">https://dev.staging-perlmanandperlman.com/california-consumer-privacy-act-ccpa-you-are-not-california-dreamin/</guid>

					<description><![CDATA[<p>What Is It? The California Consumer Privacy Act (CCPA) goes into effect January 1, 2020. It is the most recent personal data protection law passed by the State of California, and provides California residents with more control over the collection, use, and protection of their personal information. The CCPA’s broad privacy requirements are entirely new, [&#8230;]</p>
<p>The post <a href="https://dev.staging-perlmanandperlman.com/california-consumer-privacy-act-ccpa-you-are-not-california-dreamin/">California Consumer Privacy Act (CCPA)  – You are not California Dreamin’!</a> first appeared on <a href="https://dev.staging-perlmanandperlman.com">Perlman Sandbox</a>.</p>]]></description>
										<content:encoded><![CDATA[<p><em>What Is It?</em><br />
The California Consumer Privacy Act (CCPA) goes into effect January 1, 2020. It is the most recent personal data protection law passed by the State of California, and provides California residents with more control over the collection, use, and protection of their personal information.</p>
<p>The CCPA’s broad privacy requirements are entirely new, and are certainly among the strictest privacy laws in the United States. It is important to note that CCPA is not a replacement for other existing California privacy law &#8211; all of those laws remain  in effect. Here the focus is on CCPA.</p>
<p><em>Does it Apply to Your Company?</em><br />
CCPA applies to any for profit company in the world which collects personal data, and</p>
<ol>
<li>Has annual gross revenues of at least $25 million; or</li>
<li>Obtains personal information of at least 50,000 California residents, households, and /or devices per year; or</li>
<li>Derives at least 50% of its annual revenue from selling California residents’ personal information</li>
</ol>
<p><em>What to Do to Prepare</em><br />
To comply,  companies will have to adopt a variety of new measures, including:</p>
<p>• Draft and post a comprehensive privacy notice <em>( send me an email request for a more detailed list of elements to include)</em><br />
• Conduct a data inventory to “map” the use of California residents personal data and instances of “selling” data<br />
• Implement procedures to meet the new individual rights for data access, deletion and opting-out<br />
• Update all vendor agreements with third-parties who may be processing such data on behalf of the business</p>
<p><em>What are the Penalties for Non-Compliance?</em><br />
Non-compliance with CCPA puts a company at risk for large fines. The Attorney General can levy fines of  up to $7500 per violation, and make the party subject to “private actions” from California residents.</p>
<p><em>Jon Dartley, Esq., 212.889.0575 ext. 224</em><br />
<em>jon@perlmanandperlman.com</em></p>
<p>DISCLAIMER:<br />
These materials were prepared for informational purposes only. The information contained herein is general in nature and may not have application to particular factual or legal circumstances. These materials do not constitute legal advice or opinions and should not be relied upon as such. Transmission of the information is not intended to create, and receipt does not constitute, an attorney-client relationship. Recipients of this information should not act upon any information in this article without seeking professional counsel.</p><p>The post <a href="https://dev.staging-perlmanandperlman.com/california-consumer-privacy-act-ccpa-you-are-not-california-dreamin/">California Consumer Privacy Act (CCPA)  – You are not California Dreamin’!</a> first appeared on <a href="https://dev.staging-perlmanandperlman.com">Perlman Sandbox</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://dev.staging-perlmanandperlman.com/california-consumer-privacy-act-ccpa-you-are-not-california-dreamin/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
