What would you like to know more about?

Our Commitment to Your Security and Privacy

We prioritize your security and privacy through risk-based identity verification, data protection, and ongoing monitoring to ensure a secure and efficient experience.

Our Core Principles

Our Customer verification practices are built upon the following principles:

  • Risk-Based Approach: We apply consistent procedures to verify identities and protect data across all Customer interactions.

  • Proportionality: Our verification measures are designed to be effective in identifying risks without creating unnecessary burdens for you.

  • Accuracy and Reliability: We utilize trusted methods and sources to ensure the accuracy of identity verification.

  • Data Privacy and Security: All information collected for verification purposes is handled with the utmost care, in strict accordance with our data privacy policies and relevant data protection laws.

  • Ongoing Monitoring: In certain situations, we may conduct ongoing monitoring of Customer information to ensure continued accuracy and adapt to any changes in risk.

How We Verify Your Identity

To prevent fraudulent activities and protect your account, we employ careful procedures to verify your identity. While specific details may vary depending on the nature of your interaction with us, our general approach involves:

  • Information Collection: When you establish an account with us, we collect essential information such as your organization's legal name, registered address, and key contacts. This information helps us confirm your identity when you reach out.

  • Established Connections: When you contact our Support team through channels like chat where you are already logged in through a product, your credentials are used to verify your identity.

  • Cross-Verification: If there is any concern about the identity of an individual requesting access or changes to your account, we will verify through other established channels, such as contacting an administrator on file via phone.

  • Trigger Events: For requests involving access to sensitive information (like account, billing, or data) or significant changes to your account, we consider these "trigger events." In these instances, we will take additional steps to verify your identity, often by contacting an authorized individual through a separate communication channel (e.g., a phone call to an administrator).

Our aim is to provide a secure environment for all your interactions with us while ensuring a smooth and efficient experience. We prioritize your security, privacy, and your trust above all else.

How You Can Help Protect Your Data

Protecting our Customers' data is a responsibility we take very seriously. However, pastors and church leaders also bear responsibility in safekeeping data and thwarting social engineering tactics.

  • Encourage staff and members to make sure they can see personal information and update privacy settings accordingly.

  • Administrators should verify new account registrations daily.

  • Always update your browsers or allow them to automatically update on all devices.

  • Using outdated browsers can introduce vulnerabilities and potentially allow malware or other threat actors into your system.

  • Keep your operating system current and check the system requirements to make sure it's still supported.

  • Use strong, unique passwords and don't share passwords or logins with others.

  • Use trusted antivirus software and update it daily.