This article provides an overview of the steps Double the Donation takes to prioritize data security.
Our products and services are transforming the matching gift industry with cutting-edge tools and automation. But the backbone of our success is providing a safe and trustworthy place for your fundraising data. Protecting your data is our obsession.
SOC 2 Type 2 Compliance
Double the Donation is proud to be SOC 2 Type 2 compliant, with an unqualified opinion on our audit report.
For the most comprehensive, up-to-date security and compliance information, including our Letter of Attestation, visit the Double the Donation Trust Center, hosted by Vanta.
Resilience and Availability
Will Double the Donation's software be available?
Data Backups
Double the Donation backs up its database data every hour to multiple sources via encrypted channels. We regularly test backups on a spare server to ensure that our backups work and that they can be quickly restored when necessary.
What if something isn't working as expected?
Your matching gift pages, usage of our search tools, and 360MatchPro automation and outreach are as critical to us as they are to you. If there’s ever a customer-impacting situation please email support@doublethedonation.com with the subject line starting with "URGENT" and we'll route it appropriately.
How clients are affected if our services go down
We design our code so that when adding our plugin to your forms, they continue to work even if our plugin is not functioning. For example, if you put our streamlined search on your donation form, the matching gift input form field will fall back to a standard form field if our plugin can't be loaded. That way, donations will still be processed, just without matching gift information.
Our dedicated matching gift plugin will simply show a space if it cannot be loaded.
Emails to donors are not sent when our services are down but are queued to be immediately sent when service resumes.
Does Double the Donation monitor its systems and software?
Yes! Our operations teams monitor software and application behavior 24x7x365 using industry-recognized solutions with multiple notification systems in place, including services like Uptime Monitor and Sentry.io. We have multiple personnel able to respond to downtime and restore services.
Application Security
Does Double the Donation encrypt data in transit?
Can I use SSL (TLS) with Double the Donation's tools?
Is my website or data protected by a Web Application Firewall and network firewall?
Does Double the Donation incorporate security into its software development lifecycle (SDLC)?
Datacenter Protections
Are physical security protections in place to protect my data?
Software Security
Can the Double the Donation software respond quickly to new security needs or threats?
Does the Double the Donation infrastructure detect and prevent attacks?
Does Double the Donation rapidly patch and update when vulnerabilities are identified?
Does Double the Donation have an incident response program?
Audits, Vulnerability Assessment & Penetration Testing
Does Double the Donation have a repeatable process for discovering and quickly correcting security bugs?
What security is in place at Double the Donation's data centers?