Practical Guides

Data Security Training for Charity Volunteers: Making It Accessible and Effective

Charity volunteers are some of the most mission-committed people you will encounter — and among the least well-prepared for the cybersecurity risks they face when handling donor, beneficiary, or operational data. Annual mandatory data protection training designed for office workers does not address the specific situations volunteers encounter: using personal devices for charity work, handling beneficiary data at community events, sharing sensitive information via personal email, or receiving a phishing email on a device that has no security software. Effective volunteer data security training is short, practical, relevant, and delivered through channels volunteers actually engage with.

Only 31% of charities provide any cybersecurity or data protection training specifically for volunteers — leaving the majority of data handlers untrained.

Designing Security Training for Charity Volunteers

Effective volunteer security training must be: short (volunteers will not complete a 45-minute e-learning module — 10–15 minutes maximum, with a brief quiz to confirm understanding); relevant to their specific role (a volunteer who handles cash and donor addresses has different risks from one who manages social media — both need role-relevant training); accessible on personal devices (most volunteers will complete training on a smartphone — training must be mobile-accessible); practical (tell volunteers exactly what to do and not do, not just abstract principles); and regularly updated (training completed two years ago does not address current threat patterns). The ICO and Charity Commission both expect volunteer training to be part of a charity's data protection framework — evidence of volunteer training completion is part of DSPT compliance for charities using NHS systems.

Key Security Messages for Charity Volunteers

The core security messages every charity volunteer should understand: only use charity-approved devices and accounts for charity work, or follow the charity's personal device policy; never forward beneficiary information or donor data to personal email accounts; report anything that seems unusual — a suspicious email, an unexpected request for information, a system behaving strangely — to the Data Protection Lead; use strong, unique passwords and MFA on any accounts used for charity work; lock your screen when you step away from a device containing charity data; be suspicious of requests for urgent payments or data changes — verify by phone on a known number; and follow the charity's data retention policy — delete beneficiary or donor data when it is no longer needed for the service. These messages can be delivered as a one-page reference card, an induction checklist, or a brief video — the format matters less than the regularity of reinforcement.

Kyanite Blue specialises in cybersecurity for iGaming operators. MGA-licensed operators across Malta trust our stack.

Get in touch

Ready to secure your iGaming operation?

MGA-licensed operators across Malta trust Kyanite Blue.