| PCI DSS 4.0.1 | Any org that processes, stores, or transmits credit card data — online donations, event check-out, recurring giving | Network segmentation, MFA, vulnerability management, encrypted card data, annual self-assessment or QSA validation. Mandatory since March 31, 2025. | Managed cybersecurity, network segmentation, MFA, donation-platform tokenization review |
| HIPAA | Human services nonprofits, behavioral health orgs, free clinics, and any 501(c)(3) covered entity or business associate handling PHI | Administrative, physical, and technical safeguards, BAA agreements with vendors, encryption at rest and in transit, breach notification | HIPAA-aware managed IT, encrypted endpoints, M365 with HIPAA BAA, backup with retention controls |
| State Donor Data Privacy | All nonprofits collecting donor PII; specific obligations vary by state of donor residence | NJDPA, NY SHIELD Act, PA Breach of Personal Information Notification Act, FL FIPA. Reasonable safeguards, breach notification timelines, and (for some states) consumer rights | Donor database hardening, access governance, breach response runbook, dark web monitoring |
| GLBA-Adjacent Posture | Foundations and associations holding member or grantee financial data, especially those engaged in financial-services-adjacent work | Written information security program, risk assessments, vendor management, encryption, access controls, incident response plan | Documented WISP, identity governance, MDR, conditional access policies, incident response runbook |
| Grant-Funder Attestations | Any nonprofit receiving foundation, government, or corporate grants where the funder requires cybersecurity assurances | Documented MFA, backup, awareness training, EDR, written policies, vendor risk management, incident reporting commitment | Attestation packets, evidence library, awareness training rosters, MDR reports |
| NIST CSF 2.0 | Voluntary umbrella framework that maps cleanly to all of the above — the framework cyber insurers and grant funders increasingly reference | Govern, Identify, Protect, Detect, Respond, Recover. Written policies, asset inventory, risk register, tested response plan | CSF-aligned program structure, asset and risk inventory, quarterly board reporting, tabletop exercises |