We work with a variety of service providers who help us undertake the activities outlined in “Our Data Collection Methods,” including processing data; facilitating the operation of our site; supporting our fundraising, marketing, communications, and advocacy programs; and delivering messages to you on other platforms. For example, service providers may help us analyze traffic on our site, process credit card transactions, or facilitate activities such as the collection and delivery of petition signatures or surveys.
To the extent that any service provider has access to personally identifiable data about you, (1) it is transmitted by us to that service provider in a secure manner (please see Security Measures and Data Transmission below for more information on our security practices) and (2) we require that service provider to promise to keep that data confidential and use it only for the purpose of carrying out the functions we have engaged it to perform.
We allow some service providers to compile and use certain aggregated data for other purposes once it has been anonymized. This may include, for example, analyzing anonymized data in order to assess donor trends across organizations over time, or allowing a service provider to take aggregated and anonymized data about activity on our Site, and using that data for other purposes such as improvement of their products or benchmarking for their other clients. But we won’t agree to that unless we are confident, in each instance, that the data won’t be recombined with other information to create any record about you as an identifiable individual.
Additionally, we may share your data with service providers to deliver targeted content to you on non-NGH platforms, as described in the above section “Additional Uses.” Data shared with these service providers are transmitted in a secure manner (as described below under “Security Measures and Data Transmission”), and additionally hashed to improve privacy (hashing data refers to the practice of scrambling data in a pre-defined manner to make it more difficult to recognize). As we have limited ability to perform detailed reviews of these service providers’ security practices, and the service providers’ terms are subject to change without notice, we rely on publicly posted information to ensure their data practices meet our standards. We review these terms on a quarterly basis to ensure they have not changed their assurances.